General
-
Target
tmp
-
Size
440KB
-
Sample
220729-qcn48aadgq
-
MD5
50de304cffc8136ad4710f12411bb8b9
-
SHA1
c33513570bc9a709cd1b6c8a74f4eea0d5e8068c
-
SHA256
9b83c1efc74833172375826612ca54ccf601b3b2bf24dab96b63da8a41dfbeb8
-
SHA512
9a77a5ac3c2a06aaf2b96117a4a557f3fe7de8a8a00888898c8245b6338550664ae0cae35681b0454661413c0f412180637b74707983ef31740ac252f3bfd1fa
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5342659004:AAGqxS1lLf8YUjRqLBmCvuPBmTvA5EVHVE/sendMessage?chat_id=5464330552
Targets
-
-
Target
tmp
-
Size
440KB
-
MD5
50de304cffc8136ad4710f12411bb8b9
-
SHA1
c33513570bc9a709cd1b6c8a74f4eea0d5e8068c
-
SHA256
9b83c1efc74833172375826612ca54ccf601b3b2bf24dab96b63da8a41dfbeb8
-
SHA512
9a77a5ac3c2a06aaf2b96117a4a557f3fe7de8a8a00888898c8245b6338550664ae0cae35681b0454661413c0f412180637b74707983ef31740ac252f3bfd1fa
Score6/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-