General

  • Target

    e434e422d6bb9bc02f9a4be0b1c41d1b.bin

  • Size

    1.0MB

  • Sample

    230323-cctstaeg5y

  • MD5

    b521d3a9e0d35c90ad1fdfa7b0be3959

  • SHA1

    912a995f7c7db86e8a28703c5f92edfb11cc4e6f

  • SHA256

    5305a639404d8e4027a3798aefba5ee13a82f8af1526b4356752aafce27fa433

  • SHA512

    b71b1a707d14b6776b49c8aacb2665f1c62b39d053dd4760ef683e13745c5758f165964aeff5e70ef7ec43efe1bbb167dd69c0c1bd6dbb413c70c281c22115cc

  • SSDEEP

    24576:UyETlqWAvcQM+jQS1NdBqWIV76/mHG1dx3Bu6SEKu3e9ci0gMA3:U+BMJ+xI96+HEYU3ehMA3

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      c269b1931db163462343d0ecd8ef501e35e4da91c91f1464c8d526ef07a041bd.exe

    • Size

      1.1MB

    • MD5

      e434e422d6bb9bc02f9a4be0b1c41d1b

    • SHA1

      af7347b789fb43b26a83f4864e50eedf7f62095e

    • SHA256

      c269b1931db163462343d0ecd8ef501e35e4da91c91f1464c8d526ef07a041bd

    • SHA512

      72ffed26dfa5617a70852e88d8058d6adebcbd771bc3f0102f8fcf9bdddcac2264b37d07b5fd4790c177ad87f81fce0253ff9fc85c22f8034c066e66df657552

    • SSDEEP

      24576:nVlj9vY9URDvRtWBQDtty/ziBgqMSAqzQYkYJrrzZL:nVB9g9YDptWuryduIA1L

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks