General

  • Target

    Ziraat Bankasi Swift Mesaji.pdf.exe

  • Size

    896KB

  • Sample

    221006-nfzc9ahbf6

  • MD5

    44be4836f3228810bdb241f11a393952

  • SHA1

    6ad820d986a29601c52346323cdeff859deba0b6

  • SHA256

    7130b704fe2c8bf91508ad0dfa4869780e5afc92918f0f92e25c4e9523d1ab56

  • SHA512

    a17b9c1e08bb8bed6bc338e4ce9ccef5639fd4e9259d4401a18942c33370abce56aad6643f57be550c4066eb276ab1286647f7c326a3db9a4ef62b257416d165

  • SSDEEP

    12288:FHa2PRb2y2aWXAwWVTqiG78nvYpYWJrj+vSjURiijEZs1s4A54ve:UY2zXKV28nv8xj3jUR/E624ve

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5617443580:AAFX8iYrXMCASkw95O815OVGuLWLdSgh8Qo/sendMessage?chat_id=5334267822

Targets

    • Target

      Ziraat Bankasi Swift Mesaji.pdf.exe

    • Size

      896KB

    • MD5

      44be4836f3228810bdb241f11a393952

    • SHA1

      6ad820d986a29601c52346323cdeff859deba0b6

    • SHA256

      7130b704fe2c8bf91508ad0dfa4869780e5afc92918f0f92e25c4e9523d1ab56

    • SHA512

      a17b9c1e08bb8bed6bc338e4ce9ccef5639fd4e9259d4401a18942c33370abce56aad6643f57be550c4066eb276ab1286647f7c326a3db9a4ef62b257416d165

    • SSDEEP

      12288:FHa2PRb2y2aWXAwWVTqiG78nvYpYWJrj+vSjURiijEZs1s4A54ve:UY2zXKV28nv8xj3jUR/E624ve

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks