General
-
Target
Account Statement.tar.001
-
Size
647KB
-
Sample
220926-w9c14sbfg4
-
MD5
1af44f7773630f0bdfcd0e7e0ce321d6
-
SHA1
7c18ac8c7c40da562957642f868da1485e45926f
-
SHA256
e40b17b159807788ed27af5e7aae1bf4cf2d1468ff332ba51025c0c05155b44d
-
SHA512
e1f092e69b5f776b5c052a7e923cbea84e2ff730a47c520b48e7ae6acdc81b4346476f936ceac3afb66a782b6fdbf63399bef2d9ef0893c347be8ada11c19ac7
-
SSDEEP
12288:czE+JC2iNEF75euLUr1FvIXKHWcRmykYMX5b99fcruJfiRQ9Es/:oC16Z5fY1F2eWc2Vb4yJqRQ
Static task
static1
Behavioral task
behavioral1
Sample
Account Statement.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Account Statement.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5509348036:AAGh2wLRoXYFDYseiCQ6lJ_YRNqlLZ6lBgg/sendMessage?chat_id=1505845388
Targets
-
-
Target
Account Statement.exe
-
Size
646KB
-
MD5
af38ca383a825e106a87a4f40ac58cc3
-
SHA1
d4b96710edec425287ad941d72a1bb4408f5db3c
-
SHA256
d5b8a3cbf08b85a30f8d1f1a5af377dbe76b7aaf26f4cecbd9d731385b262e7f
-
SHA512
ccaf3d5af0e67ae4d27e7bcc067e825bb015a2202f08356f6a552eb1f3338845507e95892bce12f20df6c3cbaf471770a039a863c1eb5dca96cb44f414aee81b
-
SSDEEP
12288:8zE+JC2iNEF75euLUr1FvIXKHWcRmykYMX5b99fcruJfiRQ9Es/:IC16Z5fY1F2eWc2Vb4yJqRQ
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-