General
-
Target
SecuriteInfo.com.Trojan.DownloaderNET.345.1711.21192.exe
-
Size
646KB
-
Sample
221214-np1bxacg2t
-
MD5
ca2212313ca424fb7afab4a05037a499
-
SHA1
e0e1a2958af4cca5118c7ac08e2c9a6eaeaa8bd6
-
SHA256
00953bdb9f48f2e3583b16b779d04de51b937ab108972f3e44ad49fc304514c2
-
SHA512
8d1b218a841c7ded2bf0a7405cffa5e0e4bcf021a022334a599b47d635a2d6c8fa7ec50d52ba6d28366b1de2af624c829fcc19fe2029d45eb2f092927fd028cd
-
SSDEEP
12288:DMCFXcO4GEDdJii/cJZFGFHeRHA6yRK1HeE7SlGesvKHRskEJ0b0b0b0b0b0b0+q:wYjUG7sF+RA6yRKQE7S3oKxsxWWWWWWG
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.DownloaderNET.345.1711.21192.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.DownloaderNET.345.1711.21192.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377
Targets
-
-
Target
SecuriteInfo.com.Trojan.DownloaderNET.345.1711.21192.exe
-
Size
646KB
-
MD5
ca2212313ca424fb7afab4a05037a499
-
SHA1
e0e1a2958af4cca5118c7ac08e2c9a6eaeaa8bd6
-
SHA256
00953bdb9f48f2e3583b16b779d04de51b937ab108972f3e44ad49fc304514c2
-
SHA512
8d1b218a841c7ded2bf0a7405cffa5e0e4bcf021a022334a599b47d635a2d6c8fa7ec50d52ba6d28366b1de2af624c829fcc19fe2029d45eb2f092927fd028cd
-
SSDEEP
12288:DMCFXcO4GEDdJii/cJZFGFHeRHA6yRK1HeE7SlGesvKHRskEJ0b0b0b0b0b0b0+q:wYjUG7sF+RA6yRKQE7S3oKxsxWWWWWWG
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-