General
-
Target
Request For Quotation.gz
-
Size
505KB
-
Sample
230223-qgt62afh67
-
MD5
4be1c2beb15d9dcc3f40281b06251290
-
SHA1
7b6d02f57e3fec37e07be5b9dbca85d09e566965
-
SHA256
a441f7a3089ad5ceeb0692fcfee7a22a3f0a6a1791c4acaab1de71db23cfb7ee
-
SHA512
981fe812984a0e164499cf089c99646fdee3209959321db70aeaba0e5b2d519b00f6e27b81378706bfba9f1b419bc3072570d9826312dae43f67d8f92255e8af
-
SSDEEP
12288:IPvbohhuUqVGlVoZiUVxsXeSiv0K+V+7kJ8:I8HDlSpXEniv0LJ8
Static task
static1
Behavioral task
behavioral1
Sample
Request For Quotation.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Request For Quotation.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
Request For Quotation.exe
-
Size
520KB
-
MD5
ac92da6c3c72d2ffd2bcfd2069e2a5ec
-
SHA1
c0fe0ad6c500e8c147c538491d92f790f4b7852a
-
SHA256
e0042984cd831b02a7c2b7cb18915c2198302406aabe5c1c3d2decf7c6b252e1
-
SHA512
0cd6151ce7a17da1843115d8607bc9e0b8102b6a0fda49ba7721d0c3b8a37263096a19a75c774b49bf88d56e391de56893b05bbd501b1424c590de1a2627ded2
-
SSDEEP
12288:vY7tZQcyX/AYo2cYQxWXn4L0WXOs5R0TybkSffYp99Z4NY4hMg+:vY7t+VXBtQghq7JfYpB4K4hMX
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-