General

  • Target

    new order.exe

  • Size

    1.1MB

  • Sample

    220802-y8zjtscagm

  • MD5

    2d475dbdfd7a378689d984a04677e641

  • SHA1

    1a673fb62bb6e29fb3d9ef0d40e480cbad541879

  • SHA256

    579c3138028884421849a6d210996f27da317f22d228a98d9bd0704786090498

  • SHA512

    cf9e9014fc5b462ef5d2326c452d922b3c3b3f1317eed74b4620345fe8eeef15779abdf239d87a8c5dcb2e124c3d4214a0be8a06d43be3108e348091a7706fc5

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5330579892:AAHDIOXrD-d-pMU_JI4pPczBI962-9fokRs/sendMessage?chat_id=1494890429

Targets

    • Target

      new order.exe

    • Size

      1.1MB

    • MD5

      2d475dbdfd7a378689d984a04677e641

    • SHA1

      1a673fb62bb6e29fb3d9ef0d40e480cbad541879

    • SHA256

      579c3138028884421849a6d210996f27da317f22d228a98d9bd0704786090498

    • SHA512

      cf9e9014fc5b462ef5d2326c452d922b3c3b3f1317eed74b4620345fe8eeef15779abdf239d87a8c5dcb2e124c3d4214a0be8a06d43be3108e348091a7706fc5

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks