General

  • Target

    PTTEM CONTRACTS LK-39874672320.pdf.exe

  • Size

    165KB

  • Sample

    220817-s9bw9scee6

  • MD5

    dc2ab92a4dfeb135be66abab9f79dfd1

  • SHA1

    c1803cdea807da20a3b910677465fc154e556392

  • SHA256

    1d1fd5b8f91ec3ddef5627bd3c94761b912e6a1c9f64501136f972d931fb22ea

  • SHA512

    dd0657a9c8acd70774ff9805f1a06c1650a8e588dddbc8355eb89f9a38d803788e84ba3deeb402d7db1f28012494ea3dfcbbd906a7c4e63e65b4da6f9df3aeea

  • SSDEEP

    3072:6ZHxZ1s1Z4YCZQ8JUVov8cTbtCpXQUQTHtxR2azsy:6ZHxZ1QEZQ86Voveza

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5449766717:AAHzRorvKI5URgvleGHlq6ZvqElY68-XL18/sendMessage?chat_id=1293496579

Targets

    • Target

      PTTEM CONTRACTS LK-39874672320.pdf.exe

    • Size

      165KB

    • MD5

      dc2ab92a4dfeb135be66abab9f79dfd1

    • SHA1

      c1803cdea807da20a3b910677465fc154e556392

    • SHA256

      1d1fd5b8f91ec3ddef5627bd3c94761b912e6a1c9f64501136f972d931fb22ea

    • SHA512

      dd0657a9c8acd70774ff9805f1a06c1650a8e588dddbc8355eb89f9a38d803788e84ba3deeb402d7db1f28012494ea3dfcbbd906a7c4e63e65b4da6f9df3aeea

    • SSDEEP

      3072:6ZHxZ1s1Z4YCZQ8JUVov8cTbtCpXQUQTHtxR2azsy:6ZHxZ1QEZQ86Voveza

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Downloads MZ/PE file

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks