General

  • Target

    DEKONT_P.EXE.exe

  • Size

    1.3MB

  • Sample

    221018-ndp2ssfef5

  • MD5

    5afe8e13c85ca1b13566776bf95c8307

  • SHA1

    0c4f45714b140392797f1d8aad65da71a0ef9aaf

  • SHA256

    9ee2d324d8076b2b924ebdfbc678165a46089b8e413b292da28f6e9724e657a2

  • SHA512

    01310091d805126b39a87871202e82703d0e1a5202e90bed3fcf1af93a04dd73e9752cf72a42b7697cd2d6f09192214994cfb74dc5390ebd2125914c235777ae

  • SSDEEP

    24576:3QxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNussoiCZXqP:Ap6wgt6tM2QU2p2KwFdj

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5310184325:AAFI3fSQ6VcGu_NSTmv7d-qK2WCVhYY_qfg/sendMessage?chat_id=1293496579

Targets

    • Target

      DEKONT_P.EXE.exe

    • Size

      1.3MB

    • MD5

      5afe8e13c85ca1b13566776bf95c8307

    • SHA1

      0c4f45714b140392797f1d8aad65da71a0ef9aaf

    • SHA256

      9ee2d324d8076b2b924ebdfbc678165a46089b8e413b292da28f6e9724e657a2

    • SHA512

      01310091d805126b39a87871202e82703d0e1a5202e90bed3fcf1af93a04dd73e9752cf72a42b7697cd2d6f09192214994cfb74dc5390ebd2125914c235777ae

    • SSDEEP

      24576:3QxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxNussoiCZXqP:Ap6wgt6tM2QU2p2KwFdj

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks