General
-
Target
hesaphareketi-01.pdf.exe
-
Size
933KB
-
Sample
220909-s6gy4sgec4
-
MD5
6a81e1ecfdd0d555504d0718cf22e557
-
SHA1
73ed263a3f8de8aa99590dd240105b3f6b737150
-
SHA256
e57050b46da3903b314d721bfb34e69ad18b8906d29b0193dd155981e5f37807
-
SHA512
2660c2625e9d435cc8afbf57ba1197a02968ef046342877a62a42bcece7ebde8b40748371c0019b43c4f17a669ad614992be5ce4bf5283aba752fd59973b86f1
-
SSDEEP
12288:Km2iNhdGxvM/Ht1+uRo3MRU/1gKv6BdDaLFgha6lBFbJXlG:91xG+HtcuRLig06TCFgNvFtXlG
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.pdf.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896
Targets
-
-
Target
hesaphareketi-01.pdf.exe
-
Size
933KB
-
MD5
6a81e1ecfdd0d555504d0718cf22e557
-
SHA1
73ed263a3f8de8aa99590dd240105b3f6b737150
-
SHA256
e57050b46da3903b314d721bfb34e69ad18b8906d29b0193dd155981e5f37807
-
SHA512
2660c2625e9d435cc8afbf57ba1197a02968ef046342877a62a42bcece7ebde8b40748371c0019b43c4f17a669ad614992be5ce4bf5283aba752fd59973b86f1
-
SSDEEP
12288:Km2iNhdGxvM/Ht1+uRo3MRU/1gKv6BdDaLFgha6lBFbJXlG:91xG+HtcuRLig06TCFgNvFtXlG
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-