General

  • Target

    SecuriteInfo.com.W32.AIDetectNet.01.19566.31995

  • Size

    2.3MB

  • Sample

    220805-hrg1fshbfr

  • MD5

    7278f8490937cab29d3dd5bc75cb52ab

  • SHA1

    69a0419c995fc139ea27e731a44205cb1b686f1d

  • SHA256

    0fabbda008ee7544a4f2d1bdaf5621f19bc41e82740f293dfe1644fc0af9230b

  • SHA512

    71f6b363327b6ef6d5204cbfd31e2cb71d456ef54c24d53cd504bed6eec5b14079605f60cf47bc7ec9fbffe8b89ca37766b418ab236801193838417b4587deb7

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5446953292:AAFkDq-HVam91vjV2SXkAWjbhfkBnxaPoa4/sendMessage?chat_id=1269002131

Targets

    • Target

      SecuriteInfo.com.W32.AIDetectNet.01.19566.31995

    • Size

      2.3MB

    • MD5

      7278f8490937cab29d3dd5bc75cb52ab

    • SHA1

      69a0419c995fc139ea27e731a44205cb1b686f1d

    • SHA256

      0fabbda008ee7544a4f2d1bdaf5621f19bc41e82740f293dfe1644fc0af9230b

    • SHA512

      71f6b363327b6ef6d5204cbfd31e2cb71d456ef54c24d53cd504bed6eec5b14079605f60cf47bc7ec9fbffe8b89ca37766b418ab236801193838417b4587deb7

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks