General
-
Target
Ziraat Bankasi Swift Mesaji.pdf.exe
-
Size
896KB
-
Sample
221006-nfzc9ahbf6
-
MD5
44be4836f3228810bdb241f11a393952
-
SHA1
6ad820d986a29601c52346323cdeff859deba0b6
-
SHA256
7130b704fe2c8bf91508ad0dfa4869780e5afc92918f0f92e25c4e9523d1ab56
-
SHA512
a17b9c1e08bb8bed6bc338e4ce9ccef5639fd4e9259d4401a18942c33370abce56aad6643f57be550c4066eb276ab1286647f7c326a3db9a4ef62b257416d165
-
SSDEEP
12288:FHa2PRb2y2aWXAwWVTqiG78nvYpYWJrj+vSjURiijEZs1s4A54ve:UY2zXKV28nv8xj3jUR/E624ve
Static task
static1
Behavioral task
behavioral1
Sample
Ziraat Bankasi Swift Mesaji.pdf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Ziraat Bankasi Swift Mesaji.pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5617443580:AAFX8iYrXMCASkw95O815OVGuLWLdSgh8Qo/sendMessage?chat_id=5334267822
Targets
-
-
Target
Ziraat Bankasi Swift Mesaji.pdf.exe
-
Size
896KB
-
MD5
44be4836f3228810bdb241f11a393952
-
SHA1
6ad820d986a29601c52346323cdeff859deba0b6
-
SHA256
7130b704fe2c8bf91508ad0dfa4869780e5afc92918f0f92e25c4e9523d1ab56
-
SHA512
a17b9c1e08bb8bed6bc338e4ce9ccef5639fd4e9259d4401a18942c33370abce56aad6643f57be550c4066eb276ab1286647f7c326a3db9a4ef62b257416d165
-
SSDEEP
12288:FHa2PRb2y2aWXAwWVTqiG78nvYpYWJrj+vSjURiijEZs1s4A54ve:UY2zXKV28nv8xj3jUR/E624ve
Score10/10-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-