General
-
Target
e434e422d6bb9bc02f9a4be0b1c41d1b.bin
-
Size
1.0MB
-
Sample
230323-cctstaeg5y
-
MD5
b521d3a9e0d35c90ad1fdfa7b0be3959
-
SHA1
912a995f7c7db86e8a28703c5f92edfb11cc4e6f
-
SHA256
5305a639404d8e4027a3798aefba5ee13a82f8af1526b4356752aafce27fa433
-
SHA512
b71b1a707d14b6776b49c8aacb2665f1c62b39d053dd4760ef683e13745c5758f165964aeff5e70ef7ec43efe1bbb167dd69c0c1bd6dbb413c70c281c22115cc
-
SSDEEP
24576:UyETlqWAvcQM+jQS1NdBqWIV76/mHG1dx3Bu6SEKu3e9ci0gMA3:U+BMJ+xI96+HEYU3ehMA3
Static task
static1
Behavioral task
behavioral1
Sample
c269b1931db163462343d0ecd8ef501e35e4da91c91f1464c8d526ef07a041bd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c269b1931db163462343d0ecd8ef501e35e4da91c91f1464c8d526ef07a041bd.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
c269b1931db163462343d0ecd8ef501e35e4da91c91f1464c8d526ef07a041bd.exe
-
Size
1.1MB
-
MD5
e434e422d6bb9bc02f9a4be0b1c41d1b
-
SHA1
af7347b789fb43b26a83f4864e50eedf7f62095e
-
SHA256
c269b1931db163462343d0ecd8ef501e35e4da91c91f1464c8d526ef07a041bd
-
SHA512
72ffed26dfa5617a70852e88d8058d6adebcbd771bc3f0102f8fcf9bdddcac2264b37d07b5fd4790c177ad87f81fce0253ff9fc85c22f8034c066e66df657552
-
SSDEEP
24576:nVlj9vY9URDvRtWBQDtty/ziBgqMSAqzQYkYJrrzZL:nVB9g9YDptWuryduIA1L
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-