General
-
Target
b0e9448560ee599a965956a5efb0227b.exe
-
Size
278KB
-
Sample
220921-g12wjsbadp
-
MD5
b0e9448560ee599a965956a5efb0227b
-
SHA1
b5eb428385e2e3f47989b3c799e299766c64322a
-
SHA256
4d34911cc6d9d7b6f8eb4e43a384995af24479a2f7b9c902d26a584aeb460780
-
SHA512
173c469ae4c0bc88c5a57c65e78f970b1b1e04c35c671380df1b2f8c1fdb359b8772e1b5b9acde283f2af4e9fcb3dc7e25232c833da9982df7be2c017226de03
-
SSDEEP
3072:I54a/hIdKf8TfmRgq2QI39d7P3pjTvcEOgDX/hA45baARY5MtF9vdRzQKlfsB0Ni:cpudlTfLF5v1A4xav5YpdaKldfhfoq2
Static task
static1
Behavioral task
behavioral1
Sample
b0e9448560ee599a965956a5efb0227b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0e9448560ee599a965956a5efb0227b.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5351997584:AAEyh4aj9rNp8tJtHYZqoYG-PSzq-z5M18M/sendMessage?chat_id=1374455932
Targets
-
-
Target
b0e9448560ee599a965956a5efb0227b.exe
-
Size
278KB
-
MD5
b0e9448560ee599a965956a5efb0227b
-
SHA1
b5eb428385e2e3f47989b3c799e299766c64322a
-
SHA256
4d34911cc6d9d7b6f8eb4e43a384995af24479a2f7b9c902d26a584aeb460780
-
SHA512
173c469ae4c0bc88c5a57c65e78f970b1b1e04c35c671380df1b2f8c1fdb359b8772e1b5b9acde283f2af4e9fcb3dc7e25232c833da9982df7be2c017226de03
-
SSDEEP
3072:I54a/hIdKf8TfmRgq2QI39d7P3pjTvcEOgDX/hA45baARY5MtF9vdRzQKlfsB0Ni:cpudlTfLF5v1A4xav5YpdaKldfhfoq2
Score10/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-