General

  • Target

    Hesaphareketi-001,pdf.exe

  • Size

    21KB

  • Sample

    221024-hgb2fsehf8

  • MD5

    958ba282767aee7ee313ac28f4e010fd

  • SHA1

    1d95529a755bfb1c39b79fd3915d55a95dec6a66

  • SHA256

    270daae1261a5456d3a85fdd050e3f7c7f55ed69015bcffc1a4e958e2816a513

  • SHA512

    f5a200471f933aa70d2e91745685e287f2a716a8ac97ddabbcd5ce43c8aa63cd75165ad4e6e944aaea72de155864cb9b734dab0d80edb530b2bbb35265f0dfd5

  • SSDEEP

    384:KP4kZOL8LF7cS15iR/lW7VDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDyd5:KPfoQOYiR/lW7VDDDDDDDDDDDDDDDDDu

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5583812995:AAFKzjSLC2-pDvMQ8X47-80XjrRiWrDtxA/sendMessage?chat_id=5434600361

Targets

    • Target

      Hesaphareketi-001,pdf.exe

    • Size

      21KB

    • MD5

      958ba282767aee7ee313ac28f4e010fd

    • SHA1

      1d95529a755bfb1c39b79fd3915d55a95dec6a66

    • SHA256

      270daae1261a5456d3a85fdd050e3f7c7f55ed69015bcffc1a4e958e2816a513

    • SHA512

      f5a200471f933aa70d2e91745685e287f2a716a8ac97ddabbcd5ce43c8aa63cd75165ad4e6e944aaea72de155864cb9b734dab0d80edb530b2bbb35265f0dfd5

    • SSDEEP

      384:KP4kZOL8LF7cS15iR/lW7VDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDyd5:KPfoQOYiR/lW7VDDDDDDDDDDDDDDDDDu

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks