General

  • Target

    Swift-IMG_20221004_001.tar

  • Size

    24KB

  • Sample

    221004-k3wdbsafeq

  • MD5

    b97f4b368e5f2936952fa54b8c634ce9

  • SHA1

    4308ad5e56ce3eb372192171c8bab19078d460eb

  • SHA256

    e93300d3c30f828f0e44993cfc85fa7a72e098b6b77a9665466f29a9ee06fb8b

  • SHA512

    fa5d469030c75acc42535c7cf06474afb2a1990c5b338d1154d8fac1a75c981225f71a22ae242623bbdda2ba44c07aeb7ec5d3367675cb61edc83610e5720e41

  • SSDEEP

    384:9SK+X9LuPNMDo5e5Zz5TBHCZJ5H1NrOV:9SK+Ra8dFTBi3vNrOV

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5732817033:AAFBYIIZmJ7NuvVwD7WRcbV9qwcOqT7RpwM/sendMessage?chat_id=1638137774

Targets

    • Target

      Swift-IMG_20221004_001.exe

    • Size

      22KB

    • MD5

      e0c62ae1f14853f48c209caaf79e8d14

    • SHA1

      c10eb3c2f9bd4725ea96850ddfc1599f747dea58

    • SHA256

      617fbed8938dd5a9348bb5bfa4d81007e910fd257e286f2b76323b95433b4ae0

    • SHA512

      06c5682006d9cf3330c7dce3beb60536794aa1c66ede77df54886bd43286f243c8a9b130ca42c74901ebbea5d9dfa50194014971c767235bec4969f2464e6b2d

    • SSDEEP

      384:TSK+X9LuPNMDo5e5Zz5TBHCZJ5H1NrOV:TSK+Ra8dFTBi3vNrOV

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks