General

  • Target

    Halkbank_Ekstre_073809_405251.pdf.exe

  • Size

    836KB

  • Sample

    220922-sjg1labgc2

  • MD5

    01f58e5b211ab808d34246331dd88805

  • SHA1

    0d4b53c0d2a62472349588558cb61b4129df1840

  • SHA256

    6ff066e95b854da5bfe48955274affbeb085e793afd3e03d8af349fee6f83fee

  • SHA512

    92464e6ecec15532836bbf88087d055a2cc0589ea7ee66b8d5aefd1f57c0760fab207569fbc4b1a213a76227b9983e274821e65c71fef11a64557988a9ee81a1

  • SSDEEP

    12288:RtuTkRe+uPuzDMrKyCaqrSFj2mUenlTVnv6jTz+bsGwJJi0lttl2i:QywuUrKyCdwj2mUepVnyjTazwO0z7N

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5472661190:AAH0_Es3-7EvHKo3diARLmBSPyMQ64sYLC8/sendMessage?chat_id=1148000519

Targets

    • Target

      Halkbank_Ekstre_073809_405251.pdf.exe

    • Size

      836KB

    • MD5

      01f58e5b211ab808d34246331dd88805

    • SHA1

      0d4b53c0d2a62472349588558cb61b4129df1840

    • SHA256

      6ff066e95b854da5bfe48955274affbeb085e793afd3e03d8af349fee6f83fee

    • SHA512

      92464e6ecec15532836bbf88087d055a2cc0589ea7ee66b8d5aefd1f57c0760fab207569fbc4b1a213a76227b9983e274821e65c71fef11a64557988a9ee81a1

    • SSDEEP

      12288:RtuTkRe+uPuzDMrKyCaqrSFj2mUenlTVnv6jTz+bsGwJJi0lttl2i:QywuUrKyCdwj2mUepVnyjTazwO0z7N

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks