General
-
Target
Halkbank_Ekstre_20221230_114528_468568,PDF.exe
-
Size
415KB
-
Sample
221230-lhlttsfc95
-
MD5
dd57da0ba5835d49e8c85a41641c14b2
-
SHA1
8e823ca64e4f674953adbe045425f62f39955644
-
SHA256
16f2160476b2c78ec35b8fd9a4430b865cf3597c0da23795181196ea682f3df0
-
SHA512
368d505001ade291386265aa6fed0e7f6480174d3446232702174652c2fbfa1fe6906c4031efd5cc17f0330ecb38917ac95ad5a4d3b93f41453d183b3bb79602
-
SSDEEP
12288:yYxmJxRHHE6mRsc9gC8NLhPtD/fJomIA14mwQKEuaL2dZsLqrFNOA:yYtO/fJH4mBKmL2dtHb
Static task
static1
Behavioral task
behavioral1
Sample
Halkbank_Ekstre_20221230_114528_468568,PDF.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Halkbank_Ekstre_20221230_114528_468568,PDF.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896
Targets
-
-
Target
Halkbank_Ekstre_20221230_114528_468568,PDF.exe
-
Size
415KB
-
MD5
dd57da0ba5835d49e8c85a41641c14b2
-
SHA1
8e823ca64e4f674953adbe045425f62f39955644
-
SHA256
16f2160476b2c78ec35b8fd9a4430b865cf3597c0da23795181196ea682f3df0
-
SHA512
368d505001ade291386265aa6fed0e7f6480174d3446232702174652c2fbfa1fe6906c4031efd5cc17f0330ecb38917ac95ad5a4d3b93f41453d183b3bb79602
-
SSDEEP
12288:yYxmJxRHHE6mRsc9gC8NLhPtD/fJomIA14mwQKEuaL2dZsLqrFNOA:yYtO/fJH4mBKmL2dtHb
Score10/10-
StormKitty payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-