General

  • Target

    Halkbank_Ekstre_20221228_114528_468568,PDF.exe

  • Size

    353KB

  • Sample

    221228-jhjncshg43

  • MD5

    c66534531458e789ad2fcdb17a3a0489

  • SHA1

    28064aa47534ed6af85b6972cca639c3dcde93ee

  • SHA256

    fd10d0c124ace345aaace7bab115d0cd3771c61919912e141924991146fc6b37

  • SHA512

    1ca186310c3f85a46a3b9782c301af137be5100f988f7adc7ba266feabb45da239d8b433c6079a1d0459bbd06647aee2812c6f67394c893eb5566090c8d1613d

  • SSDEEP

    6144:CYa6H/tWpNp5Cdqzr+yohjVpP515uGUhZzN4:CY9/tANp5/zApnPb5uGUhT4

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896

Targets

    • Target

      Halkbank_Ekstre_20221228_114528_468568,PDF.exe

    • Size

      353KB

    • MD5

      c66534531458e789ad2fcdb17a3a0489

    • SHA1

      28064aa47534ed6af85b6972cca639c3dcde93ee

    • SHA256

      fd10d0c124ace345aaace7bab115d0cd3771c61919912e141924991146fc6b37

    • SHA512

      1ca186310c3f85a46a3b9782c301af137be5100f988f7adc7ba266feabb45da239d8b433c6079a1d0459bbd06647aee2812c6f67394c893eb5566090c8d1613d

    • SSDEEP

      6144:CYa6H/tWpNp5Cdqzr+yohjVpP515uGUhZzN4:CY9/tANp5/zApnPb5uGUhT4

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks