General
-
Target
22-2147 ET ALIMI,pdf.exe
-
Size
960KB
-
Sample
221122-veh37seb3v
-
MD5
6732d27706bd0aa2fcdba4ec8abdbda7
-
SHA1
a6abd8fdfaaf1c7722d6b8ca39161624aa7c2c98
-
SHA256
635462342c88f30c79a7bbc5a8e594a3c72a9bdcd33fef4a64228ead8de93399
-
SHA512
da852f2696c2050e4a79ed7280a61825e7ddc40498bb751d5d4c35e16635642a108e2bbf83b40270709faa61655c76c7f961c32c1105ea57565a4130f3a2e38f
-
SSDEEP
12288:2Ye7VY2iNUsZ1DX/VDJiOEbVKRNS8/O4Jc3EEaFt6JAZrWmIvVFVuk1s3Wl3FkZy:v1uPQRN1hKuQAZrWmItF8lQFg2qdO
Static task
static1
Behavioral task
behavioral1
Sample
22-2147 ET ALIMI,pdf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
22-2147 ET ALIMI,pdf.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5583812995:AAFKzjSLC2-pDvMQ8X47-80XjrRiWrDtxA/sendMessage?chat_id=5434600361
Targets
-
-
Target
22-2147 ET ALIMI,pdf.exe
-
Size
960KB
-
MD5
6732d27706bd0aa2fcdba4ec8abdbda7
-
SHA1
a6abd8fdfaaf1c7722d6b8ca39161624aa7c2c98
-
SHA256
635462342c88f30c79a7bbc5a8e594a3c72a9bdcd33fef4a64228ead8de93399
-
SHA512
da852f2696c2050e4a79ed7280a61825e7ddc40498bb751d5d4c35e16635642a108e2bbf83b40270709faa61655c76c7f961c32c1105ea57565a4130f3a2e38f
-
SSDEEP
12288:2Ye7VY2iNUsZ1DX/VDJiOEbVKRNS8/O4Jc3EEaFt6JAZrWmIvVFVuk1s3Wl3FkZy:v1uPQRN1hKuQAZrWmItF8lQFg2qdO
Score10/10-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-