General

  • Target

    hesaphareketi-01.exe

  • Size

    238KB

  • Sample

    220818-xxmv8adef6

  • MD5

    b26acc800dd682972c7d6369df815636

  • SHA1

    70bcaf8b0f4b74816365cf87df00360325a33d58

  • SHA256

    9e67169785560714650f46f52a0a04d3520d07fc3d431f6f537897bda3334403

  • SHA512

    c96a205e421d6f18393c2d9aca67804c5cf21cd5e1378bccd575796b1172ba044b414b38f169bf24564cf5815d4689884e8cf29a23f322ea5279e7742aaa6731

  • SSDEEP

    3072:mw4wu+T6gqPPIvuvHQFpaIYkKEPIFJzE17vtR:kb59HsaIYkb

Malware Config

Targets

    • Target

      hesaphareketi-01.exe

    • Size

      238KB

    • MD5

      b26acc800dd682972c7d6369df815636

    • SHA1

      70bcaf8b0f4b74816365cf87df00360325a33d58

    • SHA256

      9e67169785560714650f46f52a0a04d3520d07fc3d431f6f537897bda3334403

    • SHA512

      c96a205e421d6f18393c2d9aca67804c5cf21cd5e1378bccd575796b1172ba044b414b38f169bf24564cf5815d4689884e8cf29a23f322ea5279e7742aaa6731

    • SSDEEP

      3072:mw4wu+T6gqPPIvuvHQFpaIYkKEPIFJzE17vtR:kb59HsaIYkb

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks