General
-
Target
fatura643976,pdf.exe
-
Size
421KB
-
Sample
230111-larecafe9y
-
MD5
30caef35075e79f0a150e49e7fd665a9
-
SHA1
6cc67419a39d41ef1d98d7fc236470ef7b23a0ea
-
SHA256
6b3c502c1c7b53486fee54996d4c73905280fc76a897644b430d3c65a89ec381
-
SHA512
e4688addab4cdac3df8695cfecfb4719148dd14d04d0083645211a4180aea73e3d23484e63b8d2241d43318b49748dcb55906b057e5ef7e17483a2a60f26b931
-
SSDEEP
6144:OYa6whAp081nNxvOjqKoeKQFXrKr/mpn4AkpFxbn8HnOYoqDz3Y1e:OY26nvmjqKoebFGro4RpFWOTYzo1e
Static task
static1
Behavioral task
behavioral1
Sample
fatura643976,pdf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fatura643976,pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896
Targets
-
-
Target
fatura643976,pdf.exe
-
Size
421KB
-
MD5
30caef35075e79f0a150e49e7fd665a9
-
SHA1
6cc67419a39d41ef1d98d7fc236470ef7b23a0ea
-
SHA256
6b3c502c1c7b53486fee54996d4c73905280fc76a897644b430d3c65a89ec381
-
SHA512
e4688addab4cdac3df8695cfecfb4719148dd14d04d0083645211a4180aea73e3d23484e63b8d2241d43318b49748dcb55906b057e5ef7e17483a2a60f26b931
-
SSDEEP
6144:OYa6whAp081nNxvOjqKoeKQFXrKr/mpn4AkpFxbn8HnOYoqDz3Y1e:OY26nvmjqKoebFGro4RpFWOTYzo1e
Score10/10-
StormKitty payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-