General

  • Target

    b0e9448560ee599a965956a5efb0227b.exe

  • Size

    278KB

  • Sample

    220921-g12wjsbadp

  • MD5

    b0e9448560ee599a965956a5efb0227b

  • SHA1

    b5eb428385e2e3f47989b3c799e299766c64322a

  • SHA256

    4d34911cc6d9d7b6f8eb4e43a384995af24479a2f7b9c902d26a584aeb460780

  • SHA512

    173c469ae4c0bc88c5a57c65e78f970b1b1e04c35c671380df1b2f8c1fdb359b8772e1b5b9acde283f2af4e9fcb3dc7e25232c833da9982df7be2c017226de03

  • SSDEEP

    3072:I54a/hIdKf8TfmRgq2QI39d7P3pjTvcEOgDX/hA45baARY5MtF9vdRzQKlfsB0Ni:cpudlTfLF5v1A4xav5YpdaKldfhfoq2

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5351997584:AAEyh4aj9rNp8tJtHYZqoYG-PSzq-z5M18M/sendMessage?chat_id=1374455932

Targets

    • Target

      b0e9448560ee599a965956a5efb0227b.exe

    • Size

      278KB

    • MD5

      b0e9448560ee599a965956a5efb0227b

    • SHA1

      b5eb428385e2e3f47989b3c799e299766c64322a

    • SHA256

      4d34911cc6d9d7b6f8eb4e43a384995af24479a2f7b9c902d26a584aeb460780

    • SHA512

      173c469ae4c0bc88c5a57c65e78f970b1b1e04c35c671380df1b2f8c1fdb359b8772e1b5b9acde283f2af4e9fcb3dc7e25232c833da9982df7be2c017226de03

    • SSDEEP

      3072:I54a/hIdKf8TfmRgq2QI39d7P3pjTvcEOgDX/hA45baARY5MtF9vdRzQKlfsB0Ni:cpudlTfLF5v1A4xav5YpdaKldfhfoq2

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses Microsoft Outlook profiles

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks