General
-
Target
e04cc67c75ffcb323f8136e7b09e75c376d548d02410172aecc3ad6c5a5164af
-
Size
178KB
-
Sample
221115-hnp7nafc97
-
MD5
4c70eb5f963f1f34e85c715ad58bb063
-
SHA1
819265e5c7fd3620bf3ad5c369a03cf9943a08a2
-
SHA256
e04cc67c75ffcb323f8136e7b09e75c376d548d02410172aecc3ad6c5a5164af
-
SHA512
85a9bec38ee3754f0b79c242cadf76f2e47b0adfcf7ae2349a98f99ef610db9fec6a33ad79ffeb53966d7f83b17694219f54e77f5d28be7e7843622be59643fc
-
SSDEEP
3072:1/lOLu9UAiTABwneV62r2w+E9gw8GNz2Lx0+mUXfkWwJa:1dOy9UAiTABMe82IEGCN6Zfk
Static task
static1
Behavioral task
behavioral1
Sample
e04cc67c75ffcb323f8136e7b09e75c376d548d02410172aecc3ad6c5a5164af.exe
Resource
win10-20220901-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377
Targets
-
-
Target
e04cc67c75ffcb323f8136e7b09e75c376d548d02410172aecc3ad6c5a5164af
-
Size
178KB
-
MD5
4c70eb5f963f1f34e85c715ad58bb063
-
SHA1
819265e5c7fd3620bf3ad5c369a03cf9943a08a2
-
SHA256
e04cc67c75ffcb323f8136e7b09e75c376d548d02410172aecc3ad6c5a5164af
-
SHA512
85a9bec38ee3754f0b79c242cadf76f2e47b0adfcf7ae2349a98f99ef610db9fec6a33ad79ffeb53966d7f83b17694219f54e77f5d28be7e7843622be59643fc
-
SSDEEP
3072:1/lOLu9UAiTABwneV62r2w+E9gw8GNz2Lx0+mUXfkWwJa:1dOy9UAiTABMe82IEGCN6Zfk
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-