General
-
Target
fatura6245687,pdf.exe
-
Size
309KB
-
Sample
230110-tsgxmagf37
-
MD5
b8226f71e477852a471bf6789c2973ce
-
SHA1
1dd378577e31562f343de35b8019b2cbaf7b2a2e
-
SHA256
810acdb822af195ddb50ce857992f3d78ab45d5dae9496456106180b43e7b1c7
-
SHA512
354419176d07cfd905ab1b7632b441ea3ae589874b14c15ae656e87f5343d22b13b1198763e555eb89bbea4482c674b48d824768ed5940eede62a96966c50a75
-
SSDEEP
6144:2Ya6BgSECqpOY018iutYxWtsidNqts5sHqVbXa+M08f:2Y3gQqpOY018i/lG06CHIK+MH
Static task
static1
Behavioral task
behavioral1
Sample
fatura6245687,pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fatura6245687,pdf.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5732817033:AAFBYIIZmJ7NuvVwD7WRcbV9qwcOqT7RpwM/sendMessage?chat_id=1638137774
Targets
-
-
Target
fatura6245687,pdf.exe
-
Size
309KB
-
MD5
b8226f71e477852a471bf6789c2973ce
-
SHA1
1dd378577e31562f343de35b8019b2cbaf7b2a2e
-
SHA256
810acdb822af195ddb50ce857992f3d78ab45d5dae9496456106180b43e7b1c7
-
SHA512
354419176d07cfd905ab1b7632b441ea3ae589874b14c15ae656e87f5343d22b13b1198763e555eb89bbea4482c674b48d824768ed5940eede62a96966c50a75
-
SSDEEP
6144:2Ya6BgSECqpOY018iutYxWtsidNqts5sHqVbXa+M08f:2Y3gQqpOY018i/lG06CHIK+MH
Score10/10-
StormKitty payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-