General
-
Target
tmp
-
Size
440KB
-
Sample
220813-zbskpagfa9
-
MD5
441e8511c4bd646d55c6001a99057c8d
-
SHA1
25d14c05535d580bf13a2dcc48bf63eda296ea14
-
SHA256
658142bdeec19fb3ff0556a38a592458b7f005f69d11a39c34d67fd9efe6222c
-
SHA512
cc6cd104c6e37f375e8aaa1a9de1763cbaf8a6397bd4b53c63732d9422c8d53a7225bb5d0087055abb1de3b2fc5acbdb2c7b3d91a516982461f0e602a1a9d5f7
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5449766717:AAHzRorvKI5URgvleGHlq6ZvqElY68-XL18/sendMessage?chat_id=1293496579
Targets
-
-
Target
tmp
-
Size
440KB
-
MD5
441e8511c4bd646d55c6001a99057c8d
-
SHA1
25d14c05535d580bf13a2dcc48bf63eda296ea14
-
SHA256
658142bdeec19fb3ff0556a38a592458b7f005f69d11a39c34d67fd9efe6222c
-
SHA512
cc6cd104c6e37f375e8aaa1a9de1763cbaf8a6397bd4b53c63732d9422c8d53a7225bb5d0087055abb1de3b2fc5acbdb2c7b3d91a516982461f0e602a1a9d5f7
Score6/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-