General

  • Target

    tmp

  • Size

    440KB

  • Sample

    220729-qcn48aadgq

  • MD5

    50de304cffc8136ad4710f12411bb8b9

  • SHA1

    c33513570bc9a709cd1b6c8a74f4eea0d5e8068c

  • SHA256

    9b83c1efc74833172375826612ca54ccf601b3b2bf24dab96b63da8a41dfbeb8

  • SHA512

    9a77a5ac3c2a06aaf2b96117a4a557f3fe7de8a8a00888898c8245b6338550664ae0cae35681b0454661413c0f412180637b74707983ef31740ac252f3bfd1fa

Score
10/10

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5342659004:AAGqxS1lLf8YUjRqLBmCvuPBmTvA5EVHVE/sendMessage?chat_id=5464330552

Targets

    • Target

      tmp

    • Size

      440KB

    • MD5

      50de304cffc8136ad4710f12411bb8b9

    • SHA1

      c33513570bc9a709cd1b6c8a74f4eea0d5e8068c

    • SHA256

      9b83c1efc74833172375826612ca54ccf601b3b2bf24dab96b63da8a41dfbeb8

    • SHA512

      9a77a5ac3c2a06aaf2b96117a4a557f3fe7de8a8a00888898c8245b6338550664ae0cae35681b0454661413c0f412180637b74707983ef31740ac252f3bfd1fa

    Score
    6/10
    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.