General

  • Target

    SOLICITUDDEPRESUPUESTO70K.iso

  • Size

    1.4MB

  • Sample

    230705-nxs8kade2y

  • MD5

    ee48031011a79a110c314c1c98ead285

  • SHA1

    65f27f964b14f1a47cb4fb9cd5e7377fff78a1eb

  • SHA256

    37408c9059163c6f28c340b275393eb3ff046639cd346383250d4d427c5ca6f5

  • SHA512

    e4409ee65499e680ab7ed2a72ca7e694c76e2360e2bccd96fe3d866c6cbd280369e8c7d5a9c30399b7c5d95800a50cea7a0dc51f6278313e81b6097b1081848b

  • SSDEEP

    12288:TLk70TnvjcJU26d4PjQGeEBO7QMPTzAwO7DiXH8EjLvQcVnHYe0ScK1h:Pk70TrcJUL/GeEBO7QMyDMHnvGBSp

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377

Targets

    • Target

      REQUEST_.EXE

    • Size

      891KB

    • MD5

      164a1a27b7b433966e4baacfd59353cc

    • SHA1

      7d1593f5ccecd3b714b47cce75b66d477b2a6025

    • SHA256

      9e375d13756195da6c9c580e435042ff8105ef2c2e83b0270d98f3fc387e6ce8

    • SHA512

      0a5df388544611698fe7398ee1227e4f8c25b772fc041acdc5e9f35866efd48f268519d8089f9b0b1c4fdeee54d01b719d1c839ac3194d80f479f9d4f03f9a20

    • SSDEEP

      12288:/Lk70TnvjcJU26d4PjQGeEBO7QMPTzAwO7DiXH8EjLvQcVnHYe0ScK1hk:zk70TrcJUL/GeEBO7QMyDMHnvGBSpc

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Detect Neshta payload

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks