General
-
Target
3d075bfc29b9d4f17ac60eea8e58a1ebe94f2af614e1637e591799338984750b
-
Size
136KB
-
Sample
221228-e8256sce2y
-
MD5
1e3b9b3c9243ad08a9a71c1c5815b194
-
SHA1
54e370ed00b51781d527f0d09f3ee69245d2d46f
-
SHA256
3d075bfc29b9d4f17ac60eea8e58a1ebe94f2af614e1637e591799338984750b
-
SHA512
8b4e90be92462e99e41de3449cd1a03dd38f03ed4d258bd5e397b1f8600909fd354ab5eaf09e098183dd901b731d231d12d0ef1b6cd8103322fb1a22db86b29b
-
SSDEEP
1536:L/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoViorkfPPJICi5h3eF13:bZTkLfhjFSiO3odkfP7iHyV
Behavioral task
behavioral1
Sample
3d075bfc29b9d4f17ac60eea8e58a1ebe94f2af614e1637e591799338984750b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d075bfc29b9d4f17ac60eea8e58a1ebe94f2af614e1637e591799338984750b.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5626885704:AAFu-gfZtINkFpAAx6IIJ--E7LcG84FhgZo/sendMessage?chat_id=5388276304
Targets
-
-
Target
3d075bfc29b9d4f17ac60eea8e58a1ebe94f2af614e1637e591799338984750b
-
Size
136KB
-
MD5
1e3b9b3c9243ad08a9a71c1c5815b194
-
SHA1
54e370ed00b51781d527f0d09f3ee69245d2d46f
-
SHA256
3d075bfc29b9d4f17ac60eea8e58a1ebe94f2af614e1637e591799338984750b
-
SHA512
8b4e90be92462e99e41de3449cd1a03dd38f03ed4d258bd5e397b1f8600909fd354ab5eaf09e098183dd901b731d231d12d0ef1b6cd8103322fb1a22db86b29b
-
SSDEEP
1536:L/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoViorkfPPJICi5h3eF13:bZTkLfhjFSiO3odkfP7iHyV
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-