General

  • Target

    hesaphareketi-01.pdf.exe

  • Size

    358KB

  • Sample

    230201-j5j8eace46

  • MD5

    587a57c6f8590b6367d67b17fce54c0d

  • SHA1

    cbe56fc0d05531d2d9e7f5c4ef628e1a9941fba7

  • SHA256

    d03d5b49976a7d150f77a892f429ed698246930ba82e538b25f7835d67b9323d

  • SHA512

    3830c61306e797465d480e6330666575669d2e5860595c6378c270b5fcc60e0b13fc0cc51f8b95b6871f21d923c99a950027a9c7138efc28766308800a11c1d2

  • SSDEEP

    6144:oYa6Si77eBf68RvZWDvY4dUk931r+qzmnblebHqHhfM:oY4i46GhWDTldzacHqBU

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5468731092:AAGGNQWBVRhX622u6xp1moMhaunIGtXuIxg/sendMessage?chat_id=1639214896

Targets

    • Target

      hesaphareketi-01.pdf.exe

    • Size

      358KB

    • MD5

      587a57c6f8590b6367d67b17fce54c0d

    • SHA1

      cbe56fc0d05531d2d9e7f5c4ef628e1a9941fba7

    • SHA256

      d03d5b49976a7d150f77a892f429ed698246930ba82e538b25f7835d67b9323d

    • SHA512

      3830c61306e797465d480e6330666575669d2e5860595c6378c270b5fcc60e0b13fc0cc51f8b95b6871f21d923c99a950027a9c7138efc28766308800a11c1d2

    • SSDEEP

      6144:oYa6Si77eBf68RvZWDvY4dUk931r+qzmnblebHqHhfM:oY4i46GhWDTldzacHqBU

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Email Collection

1
T1114

Tasks