General
-
Target
150c37f09606d999aed77f1621657847.exe
-
Size
422KB
-
Sample
220921-gbrpaafcf3
-
MD5
150c37f09606d999aed77f1621657847
-
SHA1
a75789d5c83d6b2605dc1565f9af298610c557ec
-
SHA256
1727599b52e24b71b4dc2e5e752f653bd9160dc77d6734bd0686bae753b0e362
-
SHA512
55143a949d24649a7520c621f97c132e1f3aaa40a943096c78b43c021a7e22ef7f424d5d0eb3b4a95f6917deb44e33198c4be047d80630bc318d7f8f42de2e86
-
SSDEEP
12288:GENN+T5xYrllrU7QY6MGmp13LEiX5QypIUbMp6OHf:K5xolYQY65mp13LEiX5QypIUbMp6OHf
Behavioral task
behavioral1
Sample
150c37f09606d999aed77f1621657847.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
150c37f09606d999aed77f1621657847.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5651446034:AAHNSrQ1aoBX2vvQwJ01g6tQEdX-Me4aDUI/sendMessage?chat_id=5529858195
Targets
-
-
Target
150c37f09606d999aed77f1621657847.exe
-
Size
422KB
-
MD5
150c37f09606d999aed77f1621657847
-
SHA1
a75789d5c83d6b2605dc1565f9af298610c557ec
-
SHA256
1727599b52e24b71b4dc2e5e752f653bd9160dc77d6734bd0686bae753b0e362
-
SHA512
55143a949d24649a7520c621f97c132e1f3aaa40a943096c78b43c021a7e22ef7f424d5d0eb3b4a95f6917deb44e33198c4be047d80630bc318d7f8f42de2e86
-
SSDEEP
12288:GENN+T5xYrllrU7QY6MGmp13LEiX5QypIUbMp6OHf:K5xolYQY65mp13LEiX5QypIUbMp6OHf
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
StormKitty payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-