General
-
Target
hesaphareketi-01.pdf.exe
-
Size
971KB
-
Sample
221122-r6z91sbc61
-
MD5
5abb322c719859466531ca3188ae9e87
-
SHA1
000e9615560b29b2562b337db53826564f8b52d1
-
SHA256
2165ab6a605c5ba4e532f63ceed296bafd826ba122cbc8f6422b01d737e1a126
-
SHA512
8da05db980f343be98943bb3e8a0ba21cb0ab650d67bdba1187bdbfeefed242c06d57149e8168839332852cfe5ee3dc5c9793245a99e09269c5db9fc4fb790e9
-
SSDEEP
24576:d1uSqdOeEq3ZJhp5o7by/HvhXMQhkieM9qUSV7:dvqdOXCDS7O/HvhXMQhZfS
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.pdf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.pdf.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5374342837:AAHF-c1HAIvNCdF89VuEdNggsL2YBlpgkSE/sendMessage?chat_id=2133303215
Targets
-
-
Target
hesaphareketi-01.pdf.exe
-
Size
971KB
-
MD5
5abb322c719859466531ca3188ae9e87
-
SHA1
000e9615560b29b2562b337db53826564f8b52d1
-
SHA256
2165ab6a605c5ba4e532f63ceed296bafd826ba122cbc8f6422b01d737e1a126
-
SHA512
8da05db980f343be98943bb3e8a0ba21cb0ab650d67bdba1187bdbfeefed242c06d57149e8168839332852cfe5ee3dc5c9793245a99e09269c5db9fc4fb790e9
-
SSDEEP
24576:d1uSqdOeEq3ZJhp5o7by/HvhXMQhkieM9qUSV7:dvqdOXCDS7O/HvhXMQhZfS
Score10/10-
StormKitty payload
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-