General

  • Target

    Request For Quotation.gz

  • Size

    487KB

  • Sample

    230222-rp5s6sca79

  • MD5

    cde1978c4a678168a1e18f3dd06fd4f1

  • SHA1

    33bc464061b2c9ba6c29d8d0b518c07309bc7c93

  • SHA256

    c29f0634bb2b57b4bc461099e76a01682a7132a5b679e22e3235453e02fc14ce

  • SHA512

    fa60b23f41fdb4d98e800b90e19e91d0f2a68b2b8bc849944227b97f6a0a253471ce3e69a702fcd0a500caa390336eb0642d3c95e53ad61d0322cabd5caf7eb9

  • SSDEEP

    12288:xiKxQV7xXkqrJgsDLPH/cU+B6GSzrV9Irkuj2m1QNv:0lpxXkqgsDrfNPVqrJj2VB

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      Request For Quotation.exe

    • Size

      502KB

    • MD5

      e6759016429ab2d38c9a9497325c5746

    • SHA1

      8d4a9bd427e937d523968d57f8bced231189624e

    • SHA256

      20919ab5a667f7a8ef3d7d1e614f3e448bf875a066ac56c257e2e07878f6e336

    • SHA512

      f266a3958d48efc6a9b105c62eb0cfd8d30e810b3f247e065b9b62a0f62f70642b1964a7d570f22f16a64cd1430cfa25c3de53201282773b1bd0b5ef352485b1

    • SSDEEP

      12288:vYqsd1RU0HAn7av42cnY/jVFIegYLTvEOLhPMuOBmO:vYqsd1DZ42ci7lLTsOBMucmO

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks