General
-
Target
4c1286920e0fbb0e4269f4b64ec6ca052076414a24af72f2e1a82f516a21bf52.exe
-
Size
567KB
-
Sample
221211-amnnfagd52
-
MD5
671f6fa2476117ebabadfbbabe5a4009
-
SHA1
92269b2ad71e7cac4eff7dc810f2989b93ac74b0
-
SHA256
4c1286920e0fbb0e4269f4b64ec6ca052076414a24af72f2e1a82f516a21bf52
-
SHA512
0c0d8177803158ccceca3526405f40e4e29af5ed049dda12818d97357b3cee63f8bd804cdf2df346c1022069c6960b7b596ed2f55e23264dfd790bdc3d75eac0
-
SSDEEP
12288:VYIFRHhMwBPAsS6l6y1HcjhgEbXFRcEHvhI52:VzFRBosSSFNaXFRc0hQ2
Static task
static1
Behavioral task
behavioral1
Sample
4c1286920e0fbb0e4269f4b64ec6ca052076414a24af72f2e1a82f516a21bf52.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c1286920e0fbb0e4269f4b64ec6ca052076414a24af72f2e1a82f516a21bf52.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
4c1286920e0fbb0e4269f4b64ec6ca052076414a24af72f2e1a82f516a21bf52.exe
-
Size
567KB
-
MD5
671f6fa2476117ebabadfbbabe5a4009
-
SHA1
92269b2ad71e7cac4eff7dc810f2989b93ac74b0
-
SHA256
4c1286920e0fbb0e4269f4b64ec6ca052076414a24af72f2e1a82f516a21bf52
-
SHA512
0c0d8177803158ccceca3526405f40e4e29af5ed049dda12818d97357b3cee63f8bd804cdf2df346c1022069c6960b7b596ed2f55e23264dfd790bdc3d75eac0
-
SSDEEP
12288:VYIFRHhMwBPAsS6l6y1HcjhgEbXFRcEHvhI52:VzFRBosSSFNaXFRc0hQ2
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-