General
-
Target
RFQ# 6000163267.exe
-
Size
910KB
-
Sample
221117-vgt89afa56
-
MD5
f13711fcb52a6025e97a2bf85d9d4643
-
SHA1
e662ca8610953c0c7e90a161162d3e1b03e29442
-
SHA256
1a4d18bc01f4c5857b32c7ae2ffe7ec90ff5d4e4bf312f8048bb85706f5fbff5
-
SHA512
6e1885bdae20ea8c28d95c10701d9390f44d57fa01593a63ca72c9a2124b7069e30b1875cfb795956e2f78bbe6c88a636f4aa208c865991eb762f898443d70d7
-
SSDEEP
24576:gy/5dJbw9j6QSpvsRecLAzAd/AHjZnbCkI:P/5k9GQSpCecLCKMjZnbCkI
Static task
static1
Behavioral task
behavioral1
Sample
RFQ# 6000163267.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
RFQ# 6000163267.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
RFQ# 6000163267.exe
-
Size
910KB
-
MD5
f13711fcb52a6025e97a2bf85d9d4643
-
SHA1
e662ca8610953c0c7e90a161162d3e1b03e29442
-
SHA256
1a4d18bc01f4c5857b32c7ae2ffe7ec90ff5d4e4bf312f8048bb85706f5fbff5
-
SHA512
6e1885bdae20ea8c28d95c10701d9390f44d57fa01593a63ca72c9a2124b7069e30b1875cfb795956e2f78bbe6c88a636f4aa208c865991eb762f898443d70d7
-
SSDEEP
24576:gy/5dJbw9j6QSpvsRecLAzAd/AHjZnbCkI:P/5k9GQSpCecLCKMjZnbCkI
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-