General
-
Target
1708-60-0x0000000000400000-0x000000000046D000-memory.dmp
-
Size
436KB
-
Sample
220920-th57gahbgq
-
MD5
9de282dd47c5037428eeb4a8979f10dc
-
SHA1
1a381d221b9ce37ee59a3e6f8eb46d542b9450a0
-
SHA256
c5cad95c9244643c337d0bf61b03c9ec9ff854d1354f9c5d4a03577a0ff9578f
-
SHA512
13bd26e046672c524b292a9b8e712de0fa055082462fbdd3831cdb5238519cb536d27a4abce35b475ac72d641b95170b65e2ac60fecaed8776a3390c95cb4b2e
-
SSDEEP
12288:ZWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:mxgsRftD0C2nKG
Behavioral task
behavioral1
Sample
1708-60-0x0000000000400000-0x000000000046D000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1708-60-0x0000000000400000-0x000000000046D000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5351997584:AAEyh4aj9rNp8tJtHYZqoYG-PSzq-z5M18M/sendMessage?chat_id=1374455932
Targets
-
-
Target
1708-60-0x0000000000400000-0x000000000046D000-memory.dmp
-
Size
436KB
-
MD5
9de282dd47c5037428eeb4a8979f10dc
-
SHA1
1a381d221b9ce37ee59a3e6f8eb46d542b9450a0
-
SHA256
c5cad95c9244643c337d0bf61b03c9ec9ff854d1354f9c5d4a03577a0ff9578f
-
SHA512
13bd26e046672c524b292a9b8e712de0fa055082462fbdd3831cdb5238519cb536d27a4abce35b475ac72d641b95170b65e2ac60fecaed8776a3390c95cb4b2e
-
SSDEEP
12288:ZWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:mxgsRftD0C2nKG
Score6/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-