General

  • Target

    S0LICITUDDEPRESUPUESTO240423.exe.bin

  • Size

    211KB

  • Sample

    230505-zrj89aed66

  • MD5

    f4a13d7f220fd8db56fafbdb62828a50

  • SHA1

    ed98f720d6481db8d45aba7a3889d9974902d437

  • SHA256

    2178c25cf14793aa8845ca8ee9f76d3271c91bc5eb763e97919415f9fb7d5e1d

  • SHA512

    0d6cd19ccc47a28491f5cd442a32ec83183cc093835913cf7ca94ac679609ce648c2f15d3a11722d35d2fd5cff943abe7c073639d32e49ea294e88360cd811ac

  • SSDEEP

    3072:i748SBjtujuYWofGa2OTeyGuPMZmzsq9Y2YhuhWDNJQZ5hJ8RDMh/CQgutfxvXX4:i7MOuYCduEZ8sq9Y2RWfWMRI9Ocn4

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377

Targets

    • Target

      S0LICITUDDEPRESUPUESTO240423.exe.bin

    • Size

      211KB

    • MD5

      f4a13d7f220fd8db56fafbdb62828a50

    • SHA1

      ed98f720d6481db8d45aba7a3889d9974902d437

    • SHA256

      2178c25cf14793aa8845ca8ee9f76d3271c91bc5eb763e97919415f9fb7d5e1d

    • SHA512

      0d6cd19ccc47a28491f5cd442a32ec83183cc093835913cf7ca94ac679609ce648c2f15d3a11722d35d2fd5cff943abe7c073639d32e49ea294e88360cd811ac

    • SSDEEP

      3072:i748SBjtujuYWofGa2OTeyGuPMZmzsq9Y2YhuhWDNJQZ5hJ8RDMh/CQgutfxvXX4:i7MOuYCduEZ8sq9Y2RWfWMRI9Ocn4

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks