Resubmissions

22-08-2022 13:50

220822-q5gwlsbeh5 3

22-08-2022 13:39

220822-qx9awsbea6 9

19-08-2022 15:22

220819-srv77afaer 10

General

  • Target

    Ziraat Bankasi Swift Mesaji.exe

  • Size

    21KB

  • Sample

    220819-srv77afaer

  • MD5

    d865c75250a61c050f69dbb8735581a5

  • SHA1

    3e7d1b0b961ea899e89902977e36b70fd92351a3

  • SHA256

    52e3ee0168f34ab782a8103dc77814efe970b2a0fc5636a7266a4ea3e9bae2e7

  • SHA512

    66f9439bd3f91e47ab4343147fe10d4a01fa1930b8533165744366c922865b59709683e9d453d5b2d80d12715bcb43b6898365026b12bda1817a4c8317d26500

  • SSDEEP

    192:wC1NqE7QSmGvEKL5ccJu5ZtIZlBzeE8hHQ+mv:bxUYubtQBSdXm

Malware Config

Targets

    • Target

      Ziraat Bankasi Swift Mesaji.exe

    • Size

      21KB

    • MD5

      d865c75250a61c050f69dbb8735581a5

    • SHA1

      3e7d1b0b961ea899e89902977e36b70fd92351a3

    • SHA256

      52e3ee0168f34ab782a8103dc77814efe970b2a0fc5636a7266a4ea3e9bae2e7

    • SHA512

      66f9439bd3f91e47ab4343147fe10d4a01fa1930b8533165744366c922865b59709683e9d453d5b2d80d12715bcb43b6898365026b12bda1817a4c8317d26500

    • SSDEEP

      192:wC1NqE7QSmGvEKL5ccJu5ZtIZlBzeE8hHQ+mv:bxUYubtQBSdXm

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks