General
-
Target
fatura64383,pdf.exe
-
Size
366KB
-
Sample
230109-wxlgqaae7z
-
MD5
ed637030ae7f20a8af6b08fc5401b2eb
-
SHA1
07d6ea65d57216d032a547cd41596f7f0d77fce6
-
SHA256
288a470426cff4110e23d8d2a531a19bae23149bba818a86e1e79341f10548d0
-
SHA512
c8b7216d4bfd486da62b54cb414bfd33e29304ef9d837306f01ecf36a116e2b101ab45424d1a9a7cff931947458de2dfd8af01ddcdc71b0fe89b10cc9baaf6e3
-
SSDEEP
6144:8Ya6hpFXx6WGu1PGgl95W9YBw1SrPK9a17TCd7FgibOJrdhEk:8YTpFXxLG6Gg09Yrr9f27vbOJd
Static task
static1
Behavioral task
behavioral1
Sample
fatura64383,pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fatura64383,pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5732817033:AAFBYIIZmJ7NuvVwD7WRcbV9qwcOqT7RpwM/sendMessage?chat_id=1638137774
Targets
-
-
Target
fatura64383,pdf.exe
-
Size
366KB
-
MD5
ed637030ae7f20a8af6b08fc5401b2eb
-
SHA1
07d6ea65d57216d032a547cd41596f7f0d77fce6
-
SHA256
288a470426cff4110e23d8d2a531a19bae23149bba818a86e1e79341f10548d0
-
SHA512
c8b7216d4bfd486da62b54cb414bfd33e29304ef9d837306f01ecf36a116e2b101ab45424d1a9a7cff931947458de2dfd8af01ddcdc71b0fe89b10cc9baaf6e3
-
SSDEEP
6144:8Ya6hpFXx6WGu1PGgl95W9YBw1SrPK9a17TCd7FgibOJrdhEk:8YTpFXxLG6Gg09Yrr9f27vbOJd
Score10/10-
StormKitty payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-