General
-
Target
RFQ_Technical evalution.lzh
-
Size
510KB
-
Sample
230219-dz4f7see55
-
MD5
3338d8ed5fec9f48e48031d3c387b3f7
-
SHA1
ba529821ab720c7912a0eca678733dd04d28f451
-
SHA256
6b041e56226fc797cc0ca56d29e6f851bfbe925377ee660686c1cf5120005091
-
SHA512
1b9a3951aa61569465b673e00a9327fae7671484779f4b9b4245d0da95dbba05c1de85891559c164e7573e940b8af19cf434106be3140ccaaeb9307ac0e06a4c
-
SSDEEP
12288:gtUnbnj2vyHduMWU7G5O5Eigic4UvG6+RJzt3e4kQ335zkI4VE:gt0qvyHduzU7AWm4UenzztO4kQOI4VE
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_Technical evalution.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
RFQ_Technical evalution.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Targets
-
-
Target
RFQ_Technical evalution.exe
-
Size
523KB
-
MD5
cac4348fb51dea6158f27b0f8b7a79bb
-
SHA1
402740d268dde6b07e9855b85e9cefd1abd712d1
-
SHA256
f2bf8ee81960e00ff117376675a5b662b18ca10d58164de0f5fbb560aa4199fd
-
SHA512
f13bcf56612fff85b2dee304fa622aeacfca2dd745fab79ddc0acd80352cc43f228df22fa6e74bf3840f7d1d88a3c7ddaa3c7ffa5f95f84e27ef8b33d11853c7
-
SSDEEP
12288:/YFYF0yZC++1vwE721swz90NsT6JIR/sXOcYQK6EqxapW:/YFOC5IP0+T6yRkXJKfOp
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-