General

  • Target

    New_Inquiry.scr.exe

  • Size

    622KB

  • Sample

    221117-vgtmqaba2z

  • MD5

    839d91ad6b1ad96150fb2c31431ab21b

  • SHA1

    51bc3becc236098b9fee553a6f811dab513f585a

  • SHA256

    946fa8826403d58c6694d18b89af7bf80c078f792f9aae820ac9ced395450f63

  • SHA512

    29fc5bc119543053f12a3018fea5171d55216c63bd5ad317c897450ee7d8420dd753d8ec843ca4fbb5446ee3cd10daf7f326748283a00f93e2d5ec9d7cd7e30f

  • SSDEEP

    12288:81w6sNLoD5jDqHBNfoD3UbRUPXzER/U/5s5BhcjZnbCkI:Kw67DYPbubEe/5djZnbCkI

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5412597166:AAGUaWxuTxxhNb-NRhiURcTMzuW9nhGoEs/sendMessage?chat_id=932962718

Targets

    • Target

      New_Inquiry.scr.exe

    • Size

      622KB

    • MD5

      839d91ad6b1ad96150fb2c31431ab21b

    • SHA1

      51bc3becc236098b9fee553a6f811dab513f585a

    • SHA256

      946fa8826403d58c6694d18b89af7bf80c078f792f9aae820ac9ced395450f63

    • SHA512

      29fc5bc119543053f12a3018fea5171d55216c63bd5ad317c897450ee7d8420dd753d8ec843ca4fbb5446ee3cd10daf7f326748283a00f93e2d5ec9d7cd7e30f

    • SSDEEP

      12288:81w6sNLoD5jDqHBNfoD3UbRUPXzER/U/5s5BhcjZnbCkI:Kw67DYPbubEe/5djZnbCkI

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks