General
-
Target
palmic.exe
-
Size
66KB
-
Sample
221108-pcgjpshbgp
-
MD5
ec56a21c8ee1d373f5e892cc19a14441
-
SHA1
e2834f9bfe32bb1a6b4fbb4cff128e8dcdece15b
-
SHA256
3129b84bf731a2348ea99a5d7e03c9b52993963a88607ad149b13b7cba499f19
-
SHA512
b78ca39248267de920b270323134d354cabee4fc434f1ba216669d504ffdc5e2b7cd45d54e48f457cfc9afb4cc1a52d91a0523fa7899ea8f36324668c0bd5532
-
SSDEEP
768:Yy8W6IZhbT3GpO1gyapErmN7uPS/Zp8Hk/8gV90DBVpGwDO+snK5k41PMArE7+6d:YHI72gQk+NoVLsK5k410jEY+ICyjZ
Static task
static1
Behavioral task
behavioral1
Sample
palmic.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
palmic.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377
Targets
-
-
Target
palmic.exe
-
Size
66KB
-
MD5
ec56a21c8ee1d373f5e892cc19a14441
-
SHA1
e2834f9bfe32bb1a6b4fbb4cff128e8dcdece15b
-
SHA256
3129b84bf731a2348ea99a5d7e03c9b52993963a88607ad149b13b7cba499f19
-
SHA512
b78ca39248267de920b270323134d354cabee4fc434f1ba216669d504ffdc5e2b7cd45d54e48f457cfc9afb4cc1a52d91a0523fa7899ea8f36324668c0bd5532
-
SSDEEP
768:Yy8W6IZhbT3GpO1gyapErmN7uPS/Zp8Hk/8gV90DBVpGwDO+snK5k41PMArE7+6d:YHI72gQk+NoVLsK5k410jEY+ICyjZ
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-