General

  • Target

    hesaphareketi-01.pdf.exe

  • Size

    933KB

  • Sample

    220909-s6gy4sgec4

  • MD5

    6a81e1ecfdd0d555504d0718cf22e557

  • SHA1

    73ed263a3f8de8aa99590dd240105b3f6b737150

  • SHA256

    e57050b46da3903b314d721bfb34e69ad18b8906d29b0193dd155981e5f37807

  • SHA512

    2660c2625e9d435cc8afbf57ba1197a02968ef046342877a62a42bcece7ebde8b40748371c0019b43c4f17a669ad614992be5ce4bf5283aba752fd59973b86f1

  • SSDEEP

    12288:Km2iNhdGxvM/Ht1+uRo3MRU/1gKv6BdDaLFgha6lBFbJXlG:91xG+HtcuRLig06TCFgNvFtXlG

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896

Targets

    • Target

      hesaphareketi-01.pdf.exe

    • Size

      933KB

    • MD5

      6a81e1ecfdd0d555504d0718cf22e557

    • SHA1

      73ed263a3f8de8aa99590dd240105b3f6b737150

    • SHA256

      e57050b46da3903b314d721bfb34e69ad18b8906d29b0193dd155981e5f37807

    • SHA512

      2660c2625e9d435cc8afbf57ba1197a02968ef046342877a62a42bcece7ebde8b40748371c0019b43c4f17a669ad614992be5ce4bf5283aba752fd59973b86f1

    • SSDEEP

      12288:Km2iNhdGxvM/Ht1+uRo3MRU/1gKv6BdDaLFgha6lBFbJXlG:91xG+HtcuRLig06TCFgNvFtXlG

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks