General
-
Target
Ziraat Bankasi Swift Mesaji.pdf.exe
-
Size
33KB
-
Sample
221005-pkth8secc5
-
MD5
9455a7717d998dc24c5fc7a1246982e1
-
SHA1
936922703bc7fefc3a327d85cfa175722f58f6bd
-
SHA256
ba92119725503b0b5e754a57af62b63d72db95940051489a188ddc8133f416ff
-
SHA512
32ffa42e92027902944a24d297c979068de4cd2588730df6f4f889e6c476df9c8bc0d6f30137933e64b4e66c834083ac481108b1acb2e7d24cc7f5c86e0469ef
-
SSDEEP
768:W5skIZ2HBGYd6SPdPR9/hIqQFtY2GmmIewLCsXjwmxWtOB/ucCtrOl:oXWYd6ALJmvczSLXjwmxWtG/+0
Static task
static1
Behavioral task
behavioral1
Sample
Ziraat Bankasi Swift Mesaji.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Ziraat Bankasi Swift Mesaji.pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5617443580:AAFX8iYrXMCASkw95O815OVGuLWLdSgh8Qo/sendMessage?chat_id=5334267822
Targets
-
-
Target
Ziraat Bankasi Swift Mesaji.pdf.exe
-
Size
33KB
-
MD5
9455a7717d998dc24c5fc7a1246982e1
-
SHA1
936922703bc7fefc3a327d85cfa175722f58f6bd
-
SHA256
ba92119725503b0b5e754a57af62b63d72db95940051489a188ddc8133f416ff
-
SHA512
32ffa42e92027902944a24d297c979068de4cd2588730df6f4f889e6c476df9c8bc0d6f30137933e64b4e66c834083ac481108b1acb2e7d24cc7f5c86e0469ef
-
SSDEEP
768:W5skIZ2HBGYd6SPdPR9/hIqQFtY2GmmIewLCsXjwmxWtOB/ucCtrOl:oXWYd6ALJmvczSLXjwmxWtG/+0
Score10/10-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-