General

  • Target

    8107826357.zip

  • Size

    641KB

  • Sample

    221007-sxj24scge3

  • MD5

    1250b097e4ba997cc1b6331f0bcc5e44

  • SHA1

    be89ca3e55a8ef5efa2b469c47830d4abcbe8423

  • SHA256

    91d4f5bc34ba71ca8044248ace62f835ae6007f02a12cb61c853ef980cf105fa

  • SHA512

    0f5347db901fc203dc572286c4e11efec11ca0620410a10453c845ac6e80d0e0d17be326c113f581ab4157e18351533c58d2780e23ef3711e8fea98fe893ddf4

  • SSDEEP

    12288:BbzJQWNGQvdF5Pa6D/JYqO0JmGMg6TubGLhwgXDkJjR3W7f5+6YOT1klI7/gHy9j:Bf1NGSS6pO06abQhwyDkFRkMTOREI7/B

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5415235188:AAGqakDD6FZcw5LLX6hH5qVayV-1OGURlEo/sendMessage?chat_id=1372472614

Targets

    • Target

      02a1835ea805bb1a6ca8d1706fa5a811279ec3fcb1524eb83cfa60f0314cf0dd

    • Size

      1.0MB

    • MD5

      82a1be67742da347df519c0c0b75ed87

    • SHA1

      163e5d1758c7be66a6a3a35d2f9973d209383567

    • SHA256

      02a1835ea805bb1a6ca8d1706fa5a811279ec3fcb1524eb83cfa60f0314cf0dd

    • SHA512

      d2051aa0284e0ab9151417d05eafc037695c32d6bf67512b2c8155ecc303774bdc950c24a658fb88787c4f1c3f6ae8bb0bba2017d90129afcbf484f40baaa4a7

    • SSDEEP

      12288:I5bIINzS9JAJgapke+yoaYRy6Wrq2vElGv9W:qbNzoJ0gakNy9cjWm2UGv

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks