General

  • Target

    756-63-0x0000000000400000-0x000000000046E000-memory.dmp

  • Size

    440KB

  • Sample

    221030-qmf7cscce3

  • MD5

    191b2650000e3b6be70e73eb17eb17ec

  • SHA1

    077e4d7087c2293d962fff03a45fe035b7efacfb

  • SHA256

    c1afe9b2bc6c63f7aa1561e83702fa2377510f99823f173bcba06b7120cbf5a1

  • SHA512

    b3f494c2ad6eb5476f5808acac58edbc91c79c30a1cb71462dcf62ca9d7a6feb5f338ef965c7fb0e29791933587af3262da4ce4837c1fdd8a330ffabb3d8276d

  • SSDEEP

    12288:BWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:exgsRftD0C2nKG

Score
10/10

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      756-63-0x0000000000400000-0x000000000046E000-memory.dmp

    • Size

      440KB

    • MD5

      191b2650000e3b6be70e73eb17eb17ec

    • SHA1

      077e4d7087c2293d962fff03a45fe035b7efacfb

    • SHA256

      c1afe9b2bc6c63f7aa1561e83702fa2377510f99823f173bcba06b7120cbf5a1

    • SHA512

      b3f494c2ad6eb5476f5808acac58edbc91c79c30a1cb71462dcf62ca9d7a6feb5f338ef965c7fb0e29791933587af3262da4ce4837c1fdd8a330ffabb3d8276d

    • SSDEEP

      12288:BWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:exgsRftD0C2nKG

    Score
    6/10
    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks