General
-
Target
hesaphareketi-01.exe
-
Size
33KB
-
Sample
221005-pmbq7seedr
-
MD5
d6870407aa950cb957d5953ca8f369f6
-
SHA1
b4b01dbcd3ff4c93b5bed2caca65ae5161f8da4f
-
SHA256
72f5582cc2f5a103307f8af4745d621c226dfb7940d33d18e8998b4ad1087373
-
SHA512
6cd9cd4873f1c0fb4091bc4ab5b6c1f2c66490adc7fb94a763f060e9ba91b624ea175ce340fcbfd85f8ccb1f4869bd2093f02e4e210e926af28d499a7a9fdfdf
-
SSDEEP
384:C+6mGkLVeSK3rBXnXOEGLkgt5JFV7XGddMKJKVGxovRZhYzQTBHCZJ5H1A:C+dvK3Zn+vkzzxo3TBi3vA
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5732817033:AAFBYIIZmJ7NuvVwD7WRcbV9qwcOqT7RpwM/sendMessage?chat_id=1638137774
Targets
-
-
Target
hesaphareketi-01.exe
-
Size
33KB
-
MD5
d6870407aa950cb957d5953ca8f369f6
-
SHA1
b4b01dbcd3ff4c93b5bed2caca65ae5161f8da4f
-
SHA256
72f5582cc2f5a103307f8af4745d621c226dfb7940d33d18e8998b4ad1087373
-
SHA512
6cd9cd4873f1c0fb4091bc4ab5b6c1f2c66490adc7fb94a763f060e9ba91b624ea175ce340fcbfd85f8ccb1f4869bd2093f02e4e210e926af28d499a7a9fdfdf
-
SSDEEP
384:C+6mGkLVeSK3rBXnXOEGLkgt5JFV7XGddMKJKVGxovRZhYzQTBHCZJ5H1A:C+dvK3Zn+vkzzxo3TBi3vA
Score10/10-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-