General
-
Target
QUOTATION _RFQ# 1043999.exe
-
Size
1.1MB
-
Sample
230324-kbvygsdb53
-
MD5
761e246fbdde33f37a9bd68fcc8286e7
-
SHA1
571eea7e2618ab05cb19bef6e9337855321d775c
-
SHA256
c376fe2391abf98b6da345abfa7ce5d51da5cbcd172423083da3dc83fbb9cdb1
-
SHA512
fe4ab08a13765c061c30cd3f6dfcbb34960f587b44f231eefcd736790fbe56788b4f1ec04ebf563644628c728d54d13ccd2aa1527cec05db5e3b664363b9f59b
-
SSDEEP
24576:/YtQ7AZ1RnHQjI9A4/wsf3Iz39pnvgey2UNupVchQXPA3:A1n5e4/wmItpnyJNwV2L
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION _RFQ# 1043999.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
QUOTATION _RFQ# 1043999.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
QUOTATION _RFQ# 1043999.exe
-
Size
1.1MB
-
MD5
761e246fbdde33f37a9bd68fcc8286e7
-
SHA1
571eea7e2618ab05cb19bef6e9337855321d775c
-
SHA256
c376fe2391abf98b6da345abfa7ce5d51da5cbcd172423083da3dc83fbb9cdb1
-
SHA512
fe4ab08a13765c061c30cd3f6dfcbb34960f587b44f231eefcd736790fbe56788b4f1ec04ebf563644628c728d54d13ccd2aa1527cec05db5e3b664363b9f59b
-
SSDEEP
24576:/YtQ7AZ1RnHQjI9A4/wsf3Iz39pnvgey2UNupVchQXPA3:A1n5e4/wmItpnyJNwV2L
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-