General
-
Target
hesaphareketi-01.exe
-
Size
21KB
-
Sample
221017-hel4msahc6
-
MD5
5cb067a6198acceabf2b866d832451ca
-
SHA1
a3cd2c82a3d0cd4e4c69f7541c49795c36376c4f
-
SHA256
72f830e51eb1757b6f3a32a3d97e6e74975cbb87d0b719a8a985e3949a6e645b
-
SHA512
98d5bb09ec4d46dc27d92d1cce06e1c8bb91341324d513212632eb19b5508cd17243196e31f62adebd89162eb7c2befb571dab9edb3b7d381c7f2ab613baa7e8
-
SSDEEP
384:ZX30HvRyAi34bh2NWWF0J8HTQS0qPnW900eAaX6SV0xYWZjANN2xeuP:B3rAO4bUNWWF0J8HTQS0qPnW900eAaX+
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5732817033:AAFBYIIZmJ7NuvVwD7WRcbV9qwcOqT7RpwM/sendMessage?chat_id=1638137774
Targets
-
-
Target
hesaphareketi-01.exe
-
Size
21KB
-
MD5
5cb067a6198acceabf2b866d832451ca
-
SHA1
a3cd2c82a3d0cd4e4c69f7541c49795c36376c4f
-
SHA256
72f830e51eb1757b6f3a32a3d97e6e74975cbb87d0b719a8a985e3949a6e645b
-
SHA512
98d5bb09ec4d46dc27d92d1cce06e1c8bb91341324d513212632eb19b5508cd17243196e31f62adebd89162eb7c2befb571dab9edb3b7d381c7f2ab613baa7e8
-
SSDEEP
384:ZX30HvRyAi34bh2NWWF0J8HTQS0qPnW900eAaX6SV0xYWZjANN2xeuP:B3rAO4bUNWWF0J8HTQS0qPnW900eAaX+
Score10/10-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-