General
-
Target
Halkbank_Ekstre_073809_405251.pdf.exe
-
Size
836KB
-
Sample
220922-sjg1labgc2
-
MD5
01f58e5b211ab808d34246331dd88805
-
SHA1
0d4b53c0d2a62472349588558cb61b4129df1840
-
SHA256
6ff066e95b854da5bfe48955274affbeb085e793afd3e03d8af349fee6f83fee
-
SHA512
92464e6ecec15532836bbf88087d055a2cc0589ea7ee66b8d5aefd1f57c0760fab207569fbc4b1a213a76227b9983e274821e65c71fef11a64557988a9ee81a1
-
SSDEEP
12288:RtuTkRe+uPuzDMrKyCaqrSFj2mUenlTVnv6jTz+bsGwJJi0lttl2i:QywuUrKyCdwj2mUepVnyjTazwO0z7N
Static task
static1
Behavioral task
behavioral1
Sample
Halkbank_Ekstre_073809_405251.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Halkbank_Ekstre_073809_405251.pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5472661190:AAH0_Es3-7EvHKo3diARLmBSPyMQ64sYLC8/sendMessage?chat_id=1148000519
Targets
-
-
Target
Halkbank_Ekstre_073809_405251.pdf.exe
-
Size
836KB
-
MD5
01f58e5b211ab808d34246331dd88805
-
SHA1
0d4b53c0d2a62472349588558cb61b4129df1840
-
SHA256
6ff066e95b854da5bfe48955274affbeb085e793afd3e03d8af349fee6f83fee
-
SHA512
92464e6ecec15532836bbf88087d055a2cc0589ea7ee66b8d5aefd1f57c0760fab207569fbc4b1a213a76227b9983e274821e65c71fef11a64557988a9ee81a1
-
SSDEEP
12288:RtuTkRe+uPuzDMrKyCaqrSFj2mUenlTVnv6jTz+bsGwJJi0lttl2i:QywuUrKyCdwj2mUepVnyjTazwO0z7N
Score10/10-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-