General
-
Target
Halkbank_Ekstre_20221003_081552_734629.pdf.exe
-
Size
965KB
-
Sample
221003-vnjq4agah9
-
MD5
8fb1f1ec968e52ae2c514d5e83639c6f
-
SHA1
18002ed9408c2ebb8c744365176e937f5b701336
-
SHA256
30c738704cea85f5ccea877f987abc3e6250ffdf52abd60852c96d5fde2281bd
-
SHA512
08684e4b8e24fd97741ca48721999cd3edb9e6278cd44da4a9169c53f060369c2b8726b0b7f6a13449b11e3fa1471536c513eb1cecbd48377a02cf35833634d5
-
SSDEEP
12288:dENf32iNCdqE22rkaJprY5M9b31qtdBPh6T0wnrK4HTN:dSf31cdfvdprY5MFlMdR+0Y
Static task
static1
Behavioral task
behavioral1
Sample
Halkbank_Ekstre_20221003_081552_734629.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Halkbank_Ekstre_20221003_081552_734629.pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5374342837:AAHF-c1HAIvNCdF89VuEdNggsL2YBlpgkSE/sendMessage?chat_id=2133303215
Targets
-
-
Target
Halkbank_Ekstre_20221003_081552_734629.pdf.exe
-
Size
965KB
-
MD5
8fb1f1ec968e52ae2c514d5e83639c6f
-
SHA1
18002ed9408c2ebb8c744365176e937f5b701336
-
SHA256
30c738704cea85f5ccea877f987abc3e6250ffdf52abd60852c96d5fde2281bd
-
SHA512
08684e4b8e24fd97741ca48721999cd3edb9e6278cd44da4a9169c53f060369c2b8726b0b7f6a13449b11e3fa1471536c513eb1cecbd48377a02cf35833634d5
-
SSDEEP
12288:dENf32iNCdqE22rkaJprY5M9b31qtdBPh6T0wnrK4HTN:dSf31cdfvdprY5MFlMdR+0Y
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-