Resubmissions

05-10-2022 12:26

221005-pmbq7seedr 10

05-10-2022 10:31

221005-mkdfxaecdj 1

General

  • Target

    hesaphareketi-01.exe

  • Size

    33KB

  • Sample

    221005-pmbq7seedr

  • MD5

    d6870407aa950cb957d5953ca8f369f6

  • SHA1

    b4b01dbcd3ff4c93b5bed2caca65ae5161f8da4f

  • SHA256

    72f5582cc2f5a103307f8af4745d621c226dfb7940d33d18e8998b4ad1087373

  • SHA512

    6cd9cd4873f1c0fb4091bc4ab5b6c1f2c66490adc7fb94a763f060e9ba91b624ea175ce340fcbfd85f8ccb1f4869bd2093f02e4e210e926af28d499a7a9fdfdf

  • SSDEEP

    384:C+6mGkLVeSK3rBXnXOEGLkgt5JFV7XGddMKJKVGxovRZhYzQTBHCZJ5H1A:C+dvK3Zn+vkzzxo3TBi3vA

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5732817033:AAFBYIIZmJ7NuvVwD7WRcbV9qwcOqT7RpwM/sendMessage?chat_id=1638137774

Targets

    • Target

      hesaphareketi-01.exe

    • Size

      33KB

    • MD5

      d6870407aa950cb957d5953ca8f369f6

    • SHA1

      b4b01dbcd3ff4c93b5bed2caca65ae5161f8da4f

    • SHA256

      72f5582cc2f5a103307f8af4745d621c226dfb7940d33d18e8998b4ad1087373

    • SHA512

      6cd9cd4873f1c0fb4091bc4ab5b6c1f2c66490adc7fb94a763f060e9ba91b624ea175ce340fcbfd85f8ccb1f4869bd2093f02e4e210e926af28d499a7a9fdfdf

    • SSDEEP

      384:C+6mGkLVeSK3rBXnXOEGLkgt5JFV7XGddMKJKVGxovRZhYzQTBHCZJ5H1A:C+dvK3Zn+vkzzxo3TBi3vA

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks