General
-
Target
756-63-0x0000000000400000-0x000000000046E000-memory.dmp
-
Size
440KB
-
Sample
221030-qmf7cscce3
-
MD5
191b2650000e3b6be70e73eb17eb17ec
-
SHA1
077e4d7087c2293d962fff03a45fe035b7efacfb
-
SHA256
c1afe9b2bc6c63f7aa1561e83702fa2377510f99823f173bcba06b7120cbf5a1
-
SHA512
b3f494c2ad6eb5476f5808acac58edbc91c79c30a1cb71462dcf62ca9d7a6feb5f338ef965c7fb0e29791933587af3262da4ce4837c1fdd8a330ffabb3d8276d
-
SSDEEP
12288:BWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:exgsRftD0C2nKG
Behavioral task
behavioral1
Sample
756-63-0x0000000000400000-0x000000000046E000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
756-63-0x0000000000400000-0x000000000046E000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
756-63-0x0000000000400000-0x000000000046E000-memory.dmp
-
Size
440KB
-
MD5
191b2650000e3b6be70e73eb17eb17ec
-
SHA1
077e4d7087c2293d962fff03a45fe035b7efacfb
-
SHA256
c1afe9b2bc6c63f7aa1561e83702fa2377510f99823f173bcba06b7120cbf5a1
-
SHA512
b3f494c2ad6eb5476f5808acac58edbc91c79c30a1cb71462dcf62ca9d7a6feb5f338ef965c7fb0e29791933587af3262da4ce4837c1fdd8a330ffabb3d8276d
-
SSDEEP
12288:BWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:exgsRftD0C2nKG
Score6/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-