General
-
Target
TRANSFERIR COPIA.exe
-
Size
337KB
-
Sample
221004-jv7wqaaefq
-
MD5
9c352057471512025b97b4b824bdd553
-
SHA1
68c6df8e09222ae9d6df0e276bbc67389ce51e7a
-
SHA256
d50091f2f374614a00ae73f14dabf529e887e1729da0903f59a09739f4c37e8d
-
SHA512
f7a830522cb4a9a258cc6717c456bb059373cc60697e7346f5865412e18c463233899bbbe5fcc2620f183f4507e5a27b5cabf8877a8f4e1e0dbc1bc17632af7b
-
SSDEEP
3072:MKfM3NUHb17PyUN25RVvoyGDDcbly+shCHHS/eOPkNa971hEbaFSkjiRrP9Nq:MJUHb17KH5TQwXsoHyeGYa+
Static task
static1
Behavioral task
behavioral1
Sample
TRANSFERIR COPIA.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
TRANSFERIR COPIA.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377
Targets
-
-
Target
TRANSFERIR COPIA.exe
-
Size
337KB
-
MD5
9c352057471512025b97b4b824bdd553
-
SHA1
68c6df8e09222ae9d6df0e276bbc67389ce51e7a
-
SHA256
d50091f2f374614a00ae73f14dabf529e887e1729da0903f59a09739f4c37e8d
-
SHA512
f7a830522cb4a9a258cc6717c456bb059373cc60697e7346f5865412e18c463233899bbbe5fcc2620f183f4507e5a27b5cabf8877a8f4e1e0dbc1bc17632af7b
-
SSDEEP
3072:MKfM3NUHb17PyUN25RVvoyGDDcbly+shCHHS/eOPkNa971hEbaFSkjiRrP9Nq:MJUHb17KH5TQwXsoHyeGYa+
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-