General

  • Target

    RFQ_Technical evalution.lzh

  • Size

    510KB

  • Sample

    230219-dz4f7see55

  • MD5

    3338d8ed5fec9f48e48031d3c387b3f7

  • SHA1

    ba529821ab720c7912a0eca678733dd04d28f451

  • SHA256

    6b041e56226fc797cc0ca56d29e6f851bfbe925377ee660686c1cf5120005091

  • SHA512

    1b9a3951aa61569465b673e00a9327fae7671484779f4b9b4245d0da95dbba05c1de85891559c164e7573e940b8af19cf434106be3140ccaaeb9307ac0e06a4c

  • SSDEEP

    12288:gtUnbnj2vyHduMWU7G5O5Eigic4UvG6+RJzt3e4kQ335zkI4VE:gt0qvyHduzU7AWm4UenzztO4kQOI4VE

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474

Targets

    • Target

      RFQ_Technical evalution.exe

    • Size

      523KB

    • MD5

      cac4348fb51dea6158f27b0f8b7a79bb

    • SHA1

      402740d268dde6b07e9855b85e9cefd1abd712d1

    • SHA256

      f2bf8ee81960e00ff117376675a5b662b18ca10d58164de0f5fbb560aa4199fd

    • SHA512

      f13bcf56612fff85b2dee304fa622aeacfca2dd745fab79ddc0acd80352cc43f228df22fa6e74bf3840f7d1d88a3c7ddaa3c7ffa5f95f84e27ef8b33d11853c7

    • SSDEEP

      12288:/YFYF0yZC++1vwE721swz90NsT6JIR/sXOcYQK6EqxapW:/YFOC5IP0+T6yRkXJKfOp

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks