General
-
Target
new order.exe
-
Size
1.1MB
-
Sample
220802-zaa91scbak
-
MD5
2d475dbdfd7a378689d984a04677e641
-
SHA1
1a673fb62bb6e29fb3d9ef0d40e480cbad541879
-
SHA256
579c3138028884421849a6d210996f27da317f22d228a98d9bd0704786090498
-
SHA512
cf9e9014fc5b462ef5d2326c452d922b3c3b3f1317eed74b4620345fe8eeef15779abdf239d87a8c5dcb2e124c3d4214a0be8a06d43be3108e348091a7706fc5
Static task
static1
Behavioral task
behavioral1
Sample
new order.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
new order.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5330579892:AAHDIOXrD-d-pMU_JI4pPczBI962-9fokRs/sendMessage?chat_id=1494890429
Targets
-
-
Target
new order.exe
-
Size
1.1MB
-
MD5
2d475dbdfd7a378689d984a04677e641
-
SHA1
1a673fb62bb6e29fb3d9ef0d40e480cbad541879
-
SHA256
579c3138028884421849a6d210996f27da317f22d228a98d9bd0704786090498
-
SHA512
cf9e9014fc5b462ef5d2326c452d922b3c3b3f1317eed74b4620345fe8eeef15779abdf239d87a8c5dcb2e124c3d4214a0be8a06d43be3108e348091a7706fc5
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-