General

  • Target

    tmp

  • Size

    440KB

  • Sample

    220729-qcn48aadgq

  • MD5

    50de304cffc8136ad4710f12411bb8b9

  • SHA1

    c33513570bc9a709cd1b6c8a74f4eea0d5e8068c

  • SHA256

    9b83c1efc74833172375826612ca54ccf601b3b2bf24dab96b63da8a41dfbeb8

  • SHA512

    9a77a5ac3c2a06aaf2b96117a4a557f3fe7de8a8a00888898c8245b6338550664ae0cae35681b0454661413c0f412180637b74707983ef31740ac252f3bfd1fa

Score
10/10

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5342659004:AAGqxS1lLf8YUjRqLBmCvuPBmTvA5EVHVE/sendMessage?chat_id=5464330552

Targets

    • Target

      tmp

    • Size

      440KB

    • MD5

      50de304cffc8136ad4710f12411bb8b9

    • SHA1

      c33513570bc9a709cd1b6c8a74f4eea0d5e8068c

    • SHA256

      9b83c1efc74833172375826612ca54ccf601b3b2bf24dab96b63da8a41dfbeb8

    • SHA512

      9a77a5ac3c2a06aaf2b96117a4a557f3fe7de8a8a00888898c8245b6338550664ae0cae35681b0454661413c0f412180637b74707983ef31740ac252f3bfd1fa

    Score
    6/10
    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks