General
-
Target
fatura6245683,pdf.exe
-
Size
299KB
-
Sample
230110-k96smsbc5w
-
MD5
f53b84d2b3d3488d56270d278bb3154e
-
SHA1
19fbce18907e7dcd0f6d064812e12abb7be38206
-
SHA256
0cd6df14b5d34f847a65f9f9ba0137472f684ff494084283f21bbd1e27bce4f2
-
SHA512
358375ea9a5b6cf3db8a83daf7a66855d47a13109bb03b6ba837b178af1d0a0c9837966d188f940d9ea642ba6063cf4e03f54319406785a2873b22d36f9d402a
-
SSDEEP
6144:QYa69gSECqpOY00S3J3xmX8bkkE+3G8c5J8FE:QYLgQqpOY00AJhTZ3G8cIFE
Static task
static1
Behavioral task
behavioral1
Sample
fatura6245683,pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fatura6245683,pdf.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896
Targets
-
-
Target
fatura6245683,pdf.exe
-
Size
299KB
-
MD5
f53b84d2b3d3488d56270d278bb3154e
-
SHA1
19fbce18907e7dcd0f6d064812e12abb7be38206
-
SHA256
0cd6df14b5d34f847a65f9f9ba0137472f684ff494084283f21bbd1e27bce4f2
-
SHA512
358375ea9a5b6cf3db8a83daf7a66855d47a13109bb03b6ba837b178af1d0a0c9837966d188f940d9ea642ba6063cf4e03f54319406785a2873b22d36f9d402a
-
SSDEEP
6144:QYa69gSECqpOY00S3J3xmX8bkkE+3G8c5J8FE:QYLgQqpOY00AJhTZ3G8cIFE
Score10/10-
StormKitty payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-