General

  • Target

    Halkbank_Ekstre_202301901_142426_2309801.doc.exe

  • Size

    440KB

  • Sample

    230119-kgfqrafe29

  • MD5

    5497b520750b56b52f2e83664c42b8b9

  • SHA1

    e954f6a3e4e870d07045607c0e8a68a6b81a8fcd

  • SHA256

    3f72559d8006b06384919574af6bfbc80f6dc43774cd56c0754ae2cc8898ef83

  • SHA512

    7290cce10407c967ae7bb00b618b0123af1df127dcd69062f174ba0b87a772cd2bb0af9c6380ecd3f21f99e071ea8c7febcc057f838db72590600980be9bbcb2

  • SSDEEP

    6144:ZYa6dITud1s4W8q9UdkRmDzR8ffwtQozmodL1qjF/2+oE8eTbYNwESdXTx:ZYcTudK4WL9lUAAtioZIjHoE84nf

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896

Targets

    • Target

      Halkbank_Ekstre_202301901_142426_2309801.doc.exe

    • Size

      440KB

    • MD5

      5497b520750b56b52f2e83664c42b8b9

    • SHA1

      e954f6a3e4e870d07045607c0e8a68a6b81a8fcd

    • SHA256

      3f72559d8006b06384919574af6bfbc80f6dc43774cd56c0754ae2cc8898ef83

    • SHA512

      7290cce10407c967ae7bb00b618b0123af1df127dcd69062f174ba0b87a772cd2bb0af9c6380ecd3f21f99e071ea8c7febcc057f838db72590600980be9bbcb2

    • SSDEEP

      6144:ZYa6dITud1s4W8q9UdkRmDzR8ffwtQozmodL1qjF/2+oE8eTbYNwESdXTx:ZYcTudK4WL9lUAAtioZIjHoE84nf

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks