General

  • Target

    tmp

  • Size

    440KB

  • Sample

    220813-zbskpagfa9

  • MD5

    441e8511c4bd646d55c6001a99057c8d

  • SHA1

    25d14c05535d580bf13a2dcc48bf63eda296ea14

  • SHA256

    658142bdeec19fb3ff0556a38a592458b7f005f69d11a39c34d67fd9efe6222c

  • SHA512

    cc6cd104c6e37f375e8aaa1a9de1763cbaf8a6397bd4b53c63732d9422c8d53a7225bb5d0087055abb1de3b2fc5acbdb2c7b3d91a516982461f0e602a1a9d5f7

Score
10/10

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5449766717:AAHzRorvKI5URgvleGHlq6ZvqElY68-XL18/sendMessage?chat_id=1293496579

Targets

    • Target

      tmp

    • Size

      440KB

    • MD5

      441e8511c4bd646d55c6001a99057c8d

    • SHA1

      25d14c05535d580bf13a2dcc48bf63eda296ea14

    • SHA256

      658142bdeec19fb3ff0556a38a592458b7f005f69d11a39c34d67fd9efe6222c

    • SHA512

      cc6cd104c6e37f375e8aaa1a9de1763cbaf8a6397bd4b53c63732d9422c8d53a7225bb5d0087055abb1de3b2fc5acbdb2c7b3d91a516982461f0e602a1a9d5f7

    Score
    6/10
    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks