General
-
Target
hesaphareketi-01.pdf.js
-
Size
410KB
-
Sample
230809-v9fassea38
-
MD5
bcb9093850861749082e61b189227937
-
SHA1
0af77c3cd52b18828eb1a77867ce05e05d5bc31b
-
SHA256
ba6268a4198e952cbf7f0cd2af1151207dd0271331069176394539011db32354
-
SHA512
ce52bdd09673a56d968f14ca5c25ffa7040c143045f582f00630720bfa3f29b24f45145c6374cd051052411846cc14cb6c2d6bce0715dbf9b0153ebbef4e91db
-
SSDEEP
6144:8Fo+/qDQ5e3ID89uFO1U0PZbXWDtZTuAMmoqME+NYloH:vh8uID8O0xbyZTxZOYQ
Static task
static1
Behavioral task
behavioral1
Sample
hesaphareketi-01.pdf.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
hesaphareketi-01.pdf.js
Resource
win10v2004-20230703-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5374342837:AAHF-c1HAIvNCdF89VuEdNggsL2YBlpgkSE/sendMessage?chat_id=2133303215
Targets
-
-
Target
hesaphareketi-01.pdf.js
-
Size
410KB
-
MD5
bcb9093850861749082e61b189227937
-
SHA1
0af77c3cd52b18828eb1a77867ce05e05d5bc31b
-
SHA256
ba6268a4198e952cbf7f0cd2af1151207dd0271331069176394539011db32354
-
SHA512
ce52bdd09673a56d968f14ca5c25ffa7040c143045f582f00630720bfa3f29b24f45145c6374cd051052411846cc14cb6c2d6bce0715dbf9b0153ebbef4e91db
-
SSDEEP
6144:8Fo+/qDQ5e3ID89uFO1U0PZbXWDtZTuAMmoqME+NYloH:vh8uID8O0xbyZTxZOYQ
Score10/10-
StormKitty payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-