General

  • Target

    hesaphareketi-01.pdf.exe

  • Size

    971KB

  • Sample

    221122-r6z91sbc61

  • MD5

    5abb322c719859466531ca3188ae9e87

  • SHA1

    000e9615560b29b2562b337db53826564f8b52d1

  • SHA256

    2165ab6a605c5ba4e532f63ceed296bafd826ba122cbc8f6422b01d737e1a126

  • SHA512

    8da05db980f343be98943bb3e8a0ba21cb0ab650d67bdba1187bdbfeefed242c06d57149e8168839332852cfe5ee3dc5c9793245a99e09269c5db9fc4fb790e9

  • SSDEEP

    24576:d1uSqdOeEq3ZJhp5o7by/HvhXMQhkieM9qUSV7:dvqdOXCDS7O/HvhXMQhZfS

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5374342837:AAHF-c1HAIvNCdF89VuEdNggsL2YBlpgkSE/sendMessage?chat_id=2133303215

Targets

    • Target

      hesaphareketi-01.pdf.exe

    • Size

      971KB

    • MD5

      5abb322c719859466531ca3188ae9e87

    • SHA1

      000e9615560b29b2562b337db53826564f8b52d1

    • SHA256

      2165ab6a605c5ba4e532f63ceed296bafd826ba122cbc8f6422b01d737e1a126

    • SHA512

      8da05db980f343be98943bb3e8a0ba21cb0ab650d67bdba1187bdbfeefed242c06d57149e8168839332852cfe5ee3dc5c9793245a99e09269c5db9fc4fb790e9

    • SSDEEP

      24576:d1uSqdOeEq3ZJhp5o7by/HvhXMQhkieM9qUSV7:dvqdOXCDS7O/HvhXMQhZfS

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks