General

  • Target

    hesaphareketi-01.exe

  • Size

    21KB

  • Sample

    221017-hel4msahc6

  • MD5

    5cb067a6198acceabf2b866d832451ca

  • SHA1

    a3cd2c82a3d0cd4e4c69f7541c49795c36376c4f

  • SHA256

    72f830e51eb1757b6f3a32a3d97e6e74975cbb87d0b719a8a985e3949a6e645b

  • SHA512

    98d5bb09ec4d46dc27d92d1cce06e1c8bb91341324d513212632eb19b5508cd17243196e31f62adebd89162eb7c2befb571dab9edb3b7d381c7f2ab613baa7e8

  • SSDEEP

    384:ZX30HvRyAi34bh2NWWF0J8HTQS0qPnW900eAaX6SV0xYWZjANN2xeuP:B3rAO4bUNWWF0J8HTQS0qPnW900eAaX+

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5732817033:AAFBYIIZmJ7NuvVwD7WRcbV9qwcOqT7RpwM/sendMessage?chat_id=1638137774

Targets

    • Target

      hesaphareketi-01.exe

    • Size

      21KB

    • MD5

      5cb067a6198acceabf2b866d832451ca

    • SHA1

      a3cd2c82a3d0cd4e4c69f7541c49795c36376c4f

    • SHA256

      72f830e51eb1757b6f3a32a3d97e6e74975cbb87d0b719a8a985e3949a6e645b

    • SHA512

      98d5bb09ec4d46dc27d92d1cce06e1c8bb91341324d513212632eb19b5508cd17243196e31f62adebd89162eb7c2befb571dab9edb3b7d381c7f2ab613baa7e8

    • SSDEEP

      384:ZX30HvRyAi34bh2NWWF0J8HTQS0qPnW900eAaX6SV0xYWZjANN2xeuP:B3rAO4bUNWWF0J8HTQS0qPnW900eAaX+

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks