General
-
Target
Hesaphareketi-001,pdf.exe
-
Size
21KB
-
Sample
221024-hgb2fsehf8
-
MD5
958ba282767aee7ee313ac28f4e010fd
-
SHA1
1d95529a755bfb1c39b79fd3915d55a95dec6a66
-
SHA256
270daae1261a5456d3a85fdd050e3f7c7f55ed69015bcffc1a4e958e2816a513
-
SHA512
f5a200471f933aa70d2e91745685e287f2a716a8ac97ddabbcd5ce43c8aa63cd75165ad4e6e944aaea72de155864cb9b734dab0d80edb530b2bbb35265f0dfd5
-
SSDEEP
384:KP4kZOL8LF7cS15iR/lW7VDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDyd5:KPfoQOYiR/lW7VDDDDDDDDDDDDDDDDDu
Static task
static1
Behavioral task
behavioral1
Sample
Hesaphareketi-001,pdf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Hesaphareketi-001,pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5583812995:AAFKzjSLC2-pDvMQ8X47-80XjrRiWrDtxA/sendMessage?chat_id=5434600361
Targets
-
-
Target
Hesaphareketi-001,pdf.exe
-
Size
21KB
-
MD5
958ba282767aee7ee313ac28f4e010fd
-
SHA1
1d95529a755bfb1c39b79fd3915d55a95dec6a66
-
SHA256
270daae1261a5456d3a85fdd050e3f7c7f55ed69015bcffc1a4e958e2816a513
-
SHA512
f5a200471f933aa70d2e91745685e287f2a716a8ac97ddabbcd5ce43c8aa63cd75165ad4e6e944aaea72de155864cb9b734dab0d80edb530b2bbb35265f0dfd5
-
SSDEEP
384:KP4kZOL8LF7cS15iR/lW7VDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDyd5:KPfoQOYiR/lW7VDDDDDDDDDDDDDDDDDu
-
StormKitty payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-