General
-
Target
SOLICITUDDEPRESUPUESTO70K.iso
-
Size
1.4MB
-
Sample
230705-nxs8kade2y
-
MD5
ee48031011a79a110c314c1c98ead285
-
SHA1
65f27f964b14f1a47cb4fb9cd5e7377fff78a1eb
-
SHA256
37408c9059163c6f28c340b275393eb3ff046639cd346383250d4d427c5ca6f5
-
SHA512
e4409ee65499e680ab7ed2a72ca7e694c76e2360e2bccd96fe3d866c6cbd280369e8c7d5a9c30399b7c5d95800a50cea7a0dc51f6278313e81b6097b1081848b
-
SSDEEP
12288:TLk70TnvjcJU26d4PjQGeEBO7QMPTzAwO7DiXH8EjLvQcVnHYe0ScK1h:Pk70TrcJUL/GeEBO7QMyDMHnvGBSp
Behavioral task
behavioral1
Sample
REQUEST_.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
REQUEST_.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5627356603:AAG-Mx0TbSHRRW6IwndrpX3VLZdhd6C-Zac/sendMessage?chat_id=5472437377
Targets
-
-
Target
REQUEST_.EXE
-
Size
891KB
-
MD5
164a1a27b7b433966e4baacfd59353cc
-
SHA1
7d1593f5ccecd3b714b47cce75b66d477b2a6025
-
SHA256
9e375d13756195da6c9c580e435042ff8105ef2c2e83b0270d98f3fc387e6ce8
-
SHA512
0a5df388544611698fe7398ee1227e4f8c25b772fc041acdc5e9f35866efd48f268519d8089f9b0b1c4fdeee54d01b719d1c839ac3194d80f479f9d4f03f9a20
-
SSDEEP
12288:/Lk70TnvjcJU26d4PjQGeEBO7QMPTzAwO7DiXH8EjLvQcVnHYe0ScK1hk:zk70TrcJUL/GeEBO7QMyDMHnvGBSpc
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-