General
-
Target
676-65-0x0000000000400000-0x0000000000472000-memory.dmp
-
Size
456KB
-
Sample
221221-r5bv2ace24
-
MD5
0da966bb703c4ccd325f850be5de3312
-
SHA1
10ed98c3a53c385b031c4e2b8a0ca36a3a45db05
-
SHA256
ccbeb25e2c6491b93ca97048c473fc8836163c151023e2f248392a4e5281d4a6
-
SHA512
fe9611c6f1205d4a1ada309878a4bddb0315fb4a0112517ffe584089a2d7c65c42507dcc5f93e608b6a9072f8df27623401825d01ad541324e275eea1020bc3c
-
SSDEEP
12288:KWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB0:hxgsRftD0C2nKG
Behavioral task
behavioral1
Sample
676-65-0x0000000000400000-0x0000000000472000-memory.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
676-65-0x0000000000400000-0x0000000000472000-memory.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5982631795:AAFe1A7BEPv_6ExMz851LxdOAjr_9gqH8zY/sendMessage?chat_id=5968311109
Targets
-
-
Target
676-65-0x0000000000400000-0x0000000000472000-memory.dmp
-
Size
456KB
-
MD5
0da966bb703c4ccd325f850be5de3312
-
SHA1
10ed98c3a53c385b031c4e2b8a0ca36a3a45db05
-
SHA256
ccbeb25e2c6491b93ca97048c473fc8836163c151023e2f248392a4e5281d4a6
-
SHA512
fe9611c6f1205d4a1ada309878a4bddb0315fb4a0112517ffe584089a2d7c65c42507dcc5f93e608b6a9072f8df27623401825d01ad541324e275eea1020bc3c
-
SSDEEP
12288:KWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB0:hxgsRftD0C2nKG
Score6/10-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-