General

  • Target

    swift.img_20220930_011_001.tar.tar

  • Size

    745KB

  • Sample

    221002-nvkhmsdeg2

  • MD5

    b87f4c8fdc90163fa31d01937ef851d0

  • SHA1

    467f16f880e121599e44ab7286b146b10d94bff1

  • SHA256

    101b3cc3a483b862054173d2c367eb0bcfb072e28687a7aa52914a43fb28aed4

  • SHA512

    402bbf71d2ef1ae3d593e9a901b31792df529b05013a88bc7e3223e19dba43b98ac74e655b615b2583d2ae5abead36fd714a4f008e75a146aaa71d345377bf3c

  • SSDEEP

    12288:Ku2iNq4nBuC43I3mQxtri2ti2NYl8so/PaSsiMWQunh3:x1lQ342QfrzYlsbFEa

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5732817033:AAFBYIIZmJ7NuvVwD7WRcbV9qwcOqT7RpwM/sendMessage?chat_id=1638137774

Targets

    • Target

      swift.img_20220930_011_001.exe

    • Size

      744KB

    • MD5

      c97c519b7b00a60d9dd9f8ced68c5c2b

    • SHA1

      9bbd320ae5901ba787cb5ecef1d71bef332d3e66

    • SHA256

      25c4ee0823873ad0e9fed128dcfb45ebb821fe7a17c396026b8d8be1c2400557

    • SHA512

      b79135c8e231c89552e74002b2a3d8a0e3a247fc9607dbc7c2d4146fb6f6b3c3ddda2c5132bc41462e67bebf0d3c37dba6133b962831359e301ee3db44bc83a9

    • SSDEEP

      12288:nu2iNq4nBuC43I3mQxtri2ti2NYl8so/PaSsiMWQunh3:u1lQ342QfrzYlsbFEa

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Email Collection

1
T1114

Tasks