General

  • Target

    Halkbank Ekstresi_910036577921.pdf.exe

  • Size

    863KB

  • Sample

    230922-183btsce96

  • MD5

    8c57dda2b134801321a87c65cfb4fd85

  • SHA1

    177ef72837380cff667111373695138decc972f3

  • SHA256

    e116864cc4443f4179cd0938dd0ef49a4217e66ca3534d4d96bdd0d54f17ff0d

  • SHA512

    5642c315cec341fd0c9a63a27d43971bcd62960d45a778dddcfde7cba8881a430566f2f6a7e7897c7252edad1651c2fadfde047b4e904ff3840f3f3472f12d4a

  • SSDEEP

    24576:P2O/GlsQSLG/5vEprm6QTkw7g6zwm4m53Sb2xIJ:GSLLmJkw5kFm53SyxIJ

Malware Config

Targets

    • Target

      Halkbank Ekstresi_910036577921.pdf.exe

    • Size

      863KB

    • MD5

      8c57dda2b134801321a87c65cfb4fd85

    • SHA1

      177ef72837380cff667111373695138decc972f3

    • SHA256

      e116864cc4443f4179cd0938dd0ef49a4217e66ca3534d4d96bdd0d54f17ff0d

    • SHA512

      5642c315cec341fd0c9a63a27d43971bcd62960d45a778dddcfde7cba8881a430566f2f6a7e7897c7252edad1651c2fadfde047b4e904ff3840f3f3472f12d4a

    • SSDEEP

      24576:P2O/GlsQSLG/5vEprm6QTkw7g6zwm4m53Sb2xIJ:GSLLmJkw5kFm53SyxIJ

    • ISR Stealer

      ISR Stealer is a modified version of Hackhound Stealer written in visual basic.

    • ISR Stealer payload

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks