General

  • Target

    Ziraat Bankasi Swift Mesaji.pdf.exe

  • Size

    33KB

  • Sample

    221005-pkth8secc5

  • MD5

    9455a7717d998dc24c5fc7a1246982e1

  • SHA1

    936922703bc7fefc3a327d85cfa175722f58f6bd

  • SHA256

    ba92119725503b0b5e754a57af62b63d72db95940051489a188ddc8133f416ff

  • SHA512

    32ffa42e92027902944a24d297c979068de4cd2588730df6f4f889e6c476df9c8bc0d6f30137933e64b4e66c834083ac481108b1acb2e7d24cc7f5c86e0469ef

  • SSDEEP

    768:W5skIZ2HBGYd6SPdPR9/hIqQFtY2GmmIewLCsXjwmxWtOB/ucCtrOl:oXWYd6ALJmvczSLXjwmxWtG/+0

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5617443580:AAFX8iYrXMCASkw95O815OVGuLWLdSgh8Qo/sendMessage?chat_id=5334267822

Targets

    • Target

      Ziraat Bankasi Swift Mesaji.pdf.exe

    • Size

      33KB

    • MD5

      9455a7717d998dc24c5fc7a1246982e1

    • SHA1

      936922703bc7fefc3a327d85cfa175722f58f6bd

    • SHA256

      ba92119725503b0b5e754a57af62b63d72db95940051489a188ddc8133f416ff

    • SHA512

      32ffa42e92027902944a24d297c979068de4cd2588730df6f4f889e6c476df9c8bc0d6f30137933e64b4e66c834083ac481108b1acb2e7d24cc7f5c86e0469ef

    • SSDEEP

      768:W5skIZ2HBGYd6SPdPR9/hIqQFtY2GmmIewLCsXjwmxWtOB/ucCtrOl:oXWYd6ALJmvczSLXjwmxWtG/+0

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks