General
-
Target
E-dekont.pdf.exe
-
Size
782KB
-
Sample
221125-h69c9aeb6z
-
MD5
24a7aabcbce1a0c2b00bfab6630cfb67
-
SHA1
83d7e07f348bc6e70b2523831ce85cf93ca94403
-
SHA256
ce2518f0eddcfaa14c9c110d8df87b6aeeebabd851c53954a6702493be867338
-
SHA512
1956a7bb12cab247612d376d4058f6f8e8fd1d30d9e83e71b1d660ee302693fc20b88fb6f147f7b185626c515fac99a8729041d3af3faccd5494f377ab238798
-
SSDEEP
12288:40mZJbxpDFZ0z33QKyd9TNEAmcS3CAzpQWoTmQEr9bTAc/LMzYyTrJjSC:40oCwKW9+CSSAF2i9nArzNYC
Static task
static1
Behavioral task
behavioral1
Sample
E-dekont.pdf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
E-dekont.pdf.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5374342837:AAHF-c1HAIvNCdF89VuEdNggsL2YBlpgkSE/sendMessage?chat_id=2133303215
Targets
-
-
Target
E-dekont.pdf.exe
-
Size
782KB
-
MD5
24a7aabcbce1a0c2b00bfab6630cfb67
-
SHA1
83d7e07f348bc6e70b2523831ce85cf93ca94403
-
SHA256
ce2518f0eddcfaa14c9c110d8df87b6aeeebabd851c53954a6702493be867338
-
SHA512
1956a7bb12cab247612d376d4058f6f8e8fd1d30d9e83e71b1d660ee302693fc20b88fb6f147f7b185626c515fac99a8729041d3af3faccd5494f377ab238798
-
SSDEEP
12288:40mZJbxpDFZ0z33QKyd9TNEAmcS3CAzpQWoTmQEr9bTAc/LMzYyTrJjSC:40oCwKW9+CSSAF2i9nArzNYC
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-