General
-
Target
test4.bin
-
Size
136KB
-
Sample
230222-fbkejabg2s
-
MD5
180d9763716878d636d0cb5f81f30e7e
-
SHA1
ecdaea23af9fd1d58cec4bdcb41fc7a6de08a1ec
-
SHA256
53f6a6358061cc25edffd7df15f1b81018364eb2b159d7add83a750d4770efa7
-
SHA512
ac461087e2a1f04fc2830bdd2916dee49702eb60fb927dbb65ca73bb2dc8b5c0ba679ee5dccf971f2bb77bf0279405d9b45c629932395f8e7b6812f98656e3dd
-
SSDEEP
1536:Q/w/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoVioZkcOqJ40eZgYAv:Q0ZTkLfhjFSiO3o3kcqZZG
Behavioral task
behavioral1
Sample
test4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
test4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5369570306:AAGakouymXOc8dp0WUuP_KaS81h9taRj_pk/sendMessage?chat_id=1884866272
Targets
-
-
Target
test4.bin
-
Size
136KB
-
MD5
180d9763716878d636d0cb5f81f30e7e
-
SHA1
ecdaea23af9fd1d58cec4bdcb41fc7a6de08a1ec
-
SHA256
53f6a6358061cc25edffd7df15f1b81018364eb2b159d7add83a750d4770efa7
-
SHA512
ac461087e2a1f04fc2830bdd2916dee49702eb60fb927dbb65ca73bb2dc8b5c0ba679ee5dccf971f2bb77bf0279405d9b45c629932395f8e7b6812f98656e3dd
-
SSDEEP
1536:Q/w/Zws3kTnvzbhNBPmxue2SRQg0dkEwiqoVioZkcOqJ40eZgYAv:Q0ZTkLfhjFSiO3o3kcqZZG
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-