General

  • Target

    SecuriteInfo.com.W32.AIDetectNet.01.19595.27384

  • Size

    2.4MB

  • Sample

    220805-hrg1fshbgj

  • MD5

    43e203dd0117ad1c79dc400e5bbb710e

  • SHA1

    fb283a29b1979bec6114dd9fd8ae777f175a02d0

  • SHA256

    b59c940c2bd7745c6aeacb811f9ff924c6f0260b05e1dd4270a0e9444354def7

  • SHA512

    aab2b59e61a5221a26e149d07670c43ba58486233b07d5444758808ec0ea9788b6dab7ad063068acb981955336f87c047006f89b68975c2b3f6f0f089bec69ca

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5446953292:AAFkDq-HVam91vjV2SXkAWjbhfkBnxaPoa4/sendMessage?chat_id=1269002131

Targets

    • Target

      SecuriteInfo.com.W32.AIDetectNet.01.19595.27384

    • Size

      2.4MB

    • MD5

      43e203dd0117ad1c79dc400e5bbb710e

    • SHA1

      fb283a29b1979bec6114dd9fd8ae777f175a02d0

    • SHA256

      b59c940c2bd7745c6aeacb811f9ff924c6f0260b05e1dd4270a0e9444354def7

    • SHA512

      aab2b59e61a5221a26e149d07670c43ba58486233b07d5444758808ec0ea9788b6dab7ad063068acb981955336f87c047006f89b68975c2b3f6f0f089bec69ca

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks