General
-
Target
Invoice and packing list.exe
-
Size
512KB
-
Sample
221222-rf46aaee93
-
MD5
7c6e72138a75a71d10bcb10eab3e17fc
-
SHA1
2846f854795ead06fc2f551c101c6047e02c279a
-
SHA256
61660da7d55fa8074c7d4ed0a26f3ae021321dee8bf5d7651c394bccde2748c7
-
SHA512
b7d046ce70c4d4e8f044659162baf19656ca82c7585c8028322075912ea86b4e43043aead2d02c54d9d2a7c7004f10ea4e822851d297ac7ee0b741d6a8873820
-
SSDEEP
12288:qDqx3btvdiCWUJUKsqvIwuycqABZ7jGZZFR3+J+Ei:qWx3ldRWUawbABZOzFZw+Ei
Static task
static1
Behavioral task
behavioral1
Sample
Invoice and packing list.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Invoice and packing list.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5982631795:AAFe1A7BEPv_6ExMz851LxdOAjr_9gqH8zY/sendMessage?chat_id=5968311109
Targets
-
-
Target
Invoice and packing list.exe
-
Size
512KB
-
MD5
7c6e72138a75a71d10bcb10eab3e17fc
-
SHA1
2846f854795ead06fc2f551c101c6047e02c279a
-
SHA256
61660da7d55fa8074c7d4ed0a26f3ae021321dee8bf5d7651c394bccde2748c7
-
SHA512
b7d046ce70c4d4e8f044659162baf19656ca82c7585c8028322075912ea86b4e43043aead2d02c54d9d2a7c7004f10ea4e822851d297ac7ee0b741d6a8873820
-
SSDEEP
12288:qDqx3btvdiCWUJUKsqvIwuycqABZ7jGZZFR3+J+Ei:qWx3ldRWUawbABZOzFZw+Ei
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-