General
-
Target
fatura002344567,pdf.exe
-
Size
266KB
-
Sample
230118-llgpaaaf9s
-
MD5
e8a06710a9e1f2ae99424343e6f79cbc
-
SHA1
661eccd39e082d74b28f0c2bba440d7b7f8033cd
-
SHA256
81d63eb754d5bf8897acfeb9762031fbe00d197c45aed84f2fe069dcd78109a1
-
SHA512
42743045b9a7dad90688a10cf2679f1256f13bea2d97d3117c84ba1eb17c16f81ad40e14858a246da6dd538ab834855560ae89394d945eb6679a3c4c7a844f6c
-
SSDEEP
6144:IYa6ub7aTUXh2l9RT70FYe5Avpc1jJdGuf:IYgXaW21W5Av25/f
Static task
static1
Behavioral task
behavioral1
Sample
fatura002344567,pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fatura002344567,pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896
Targets
-
-
Target
fatura002344567,pdf.exe
-
Size
266KB
-
MD5
e8a06710a9e1f2ae99424343e6f79cbc
-
SHA1
661eccd39e082d74b28f0c2bba440d7b7f8033cd
-
SHA256
81d63eb754d5bf8897acfeb9762031fbe00d197c45aed84f2fe069dcd78109a1
-
SHA512
42743045b9a7dad90688a10cf2679f1256f13bea2d97d3117c84ba1eb17c16f81ad40e14858a246da6dd538ab834855560ae89394d945eb6679a3c4c7a844f6c
-
SSDEEP
6144:IYa6ub7aTUXh2l9RT70FYe5Avpc1jJdGuf:IYgXaW21W5Av25/f
Score10/10-
StormKitty payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-