General

  • Target

    S0LICITUDDEPRESUPUESTO240423.ISO.iso.bin

  • Size

    1.2MB

  • Sample

    230505-zrkj1sed67

  • MD5

    f81832d1759a25d688c840ee5eee6fb5

  • SHA1

    af587f9f3fbf23166f82573056aa972aef26ec29

  • SHA256

    7b24e9a8334000a1e10dd9cdf66e92e46f890e5a89f77c6bd7e1957a2a97320b

  • SHA512

    a72dd330103d2dea85799b21dac79ae1b98112e8fdce99227febeb530e1c29d33dd3d181d43cc499d9ec50a99864d81b73201157b61249a32351edde50818ba9

  • SSDEEP

    3072:s748SBjtujuYWofGa2OTeyGuPMZmzsq9Y2YhuhWDNJQZ5hJ8RDMh/CQgutfxvXX4:s7MOuYCduEZ8sq9Y2RWfWMRI9Ocn4

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377

Targets

    • Target

      S0LICITU.EXE

    • Size

      211KB

    • MD5

      f4a13d7f220fd8db56fafbdb62828a50

    • SHA1

      ed98f720d6481db8d45aba7a3889d9974902d437

    • SHA256

      2178c25cf14793aa8845ca8ee9f76d3271c91bc5eb763e97919415f9fb7d5e1d

    • SHA512

      0d6cd19ccc47a28491f5cd442a32ec83183cc093835913cf7ca94ac679609ce648c2f15d3a11722d35d2fd5cff943abe7c073639d32e49ea294e88360cd811ac

    • SSDEEP

      3072:i748SBjtujuYWofGa2OTeyGuPMZmzsq9Y2YhuhWDNJQZ5hJ8RDMh/CQgutfxvXX4:i7MOuYCduEZ8sq9Y2RWfWMRI9Ocn4

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks