General

  • Target

    1796-71-0x0000000000400000-0x0000000000AC1000-memory.dmp

  • Size

    6.8MB

  • Sample

    220921-helswabbcj

  • MD5

    b6c2d4816d6c40cfb22ddad2e3c9159c

  • SHA1

    6ad65d011215a2e018c88665ed2c0822d350045c

  • SHA256

    87a1a5c6bd201ff5a9ad9d23cdadb4433081a86011b2fbf58a54608f567e3388

  • SHA512

    c0834d8b117f51844f8323748e40ea491a941ea7e9eace61a0bf4d3f34ea0689721eb82a5a07ec10a8c5cd8a186d87704803c38b107a1da2e26515cf1d4ad1a7

  • SSDEEP

    98304:/zWmTVckvgF5Y/3qDLSWBVDXALy/NUaKXTgsWJmt13VGdAQV4R0wizugbdgLD3D1:/z7XSBAh9Omt1FGdAhR0Fbdgv3DhAz

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5351997584:AAEyh4aj9rNp8tJtHYZqoYG-PSzq-z5M18M/sendMessage?chat_id=1374455932

Targets

    • Target

      1796-71-0x0000000000400000-0x0000000000AC1000-memory.dmp

    • Size

      6.8MB

    • MD5

      b6c2d4816d6c40cfb22ddad2e3c9159c

    • SHA1

      6ad65d011215a2e018c88665ed2c0822d350045c

    • SHA256

      87a1a5c6bd201ff5a9ad9d23cdadb4433081a86011b2fbf58a54608f567e3388

    • SHA512

      c0834d8b117f51844f8323748e40ea491a941ea7e9eace61a0bf4d3f34ea0689721eb82a5a07ec10a8c5cd8a186d87704803c38b107a1da2e26515cf1d4ad1a7

    • SSDEEP

      98304:/zWmTVckvgF5Y/3qDLSWBVDXALy/NUaKXTgsWJmt13VGdAQV4R0wizugbdgLD3D1:/z7XSBAh9Omt1FGdAhR0Fbdgv3DhAz

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

MITRE ATT&CK Matrix

Tasks