General

  • Target

    4c1286920e0fbb0e4269f4b64ec6ca052076414a24af72f2e1a82f516a21bf52.exe

  • Size

    567KB

  • Sample

    221211-amnnfagd52

  • MD5

    671f6fa2476117ebabadfbbabe5a4009

  • SHA1

    92269b2ad71e7cac4eff7dc810f2989b93ac74b0

  • SHA256

    4c1286920e0fbb0e4269f4b64ec6ca052076414a24af72f2e1a82f516a21bf52

  • SHA512

    0c0d8177803158ccceca3526405f40e4e29af5ed049dda12818d97357b3cee63f8bd804cdf2df346c1022069c6960b7b596ed2f55e23264dfd790bdc3d75eac0

  • SSDEEP

    12288:VYIFRHhMwBPAsS6l6y1HcjhgEbXFRcEHvhI52:VzFRBosSSFNaXFRc0hQ2

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      4c1286920e0fbb0e4269f4b64ec6ca052076414a24af72f2e1a82f516a21bf52.exe

    • Size

      567KB

    • MD5

      671f6fa2476117ebabadfbbabe5a4009

    • SHA1

      92269b2ad71e7cac4eff7dc810f2989b93ac74b0

    • SHA256

      4c1286920e0fbb0e4269f4b64ec6ca052076414a24af72f2e1a82f516a21bf52

    • SHA512

      0c0d8177803158ccceca3526405f40e4e29af5ed049dda12818d97357b3cee63f8bd804cdf2df346c1022069c6960b7b596ed2f55e23264dfd790bdc3d75eac0

    • SSDEEP

      12288:VYIFRHhMwBPAsS6l6y1HcjhgEbXFRcEHvhI52:VzFRBosSSFNaXFRc0hQ2

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks