General
-
Target
2024-74-0x0000000000400000-0x000000000046D000-memory.dmp
-
Size
436KB
-
Sample
230327-wac7tsgf2x
-
MD5
d5e2544f7a9aef99174b10460bac2570
-
SHA1
a6a1fe82d34bf81557a64cff2b811eb26de848dc
-
SHA256
195a869ef0427a97002e40c10fd7d6cbb4d85bb252518f2b65e32560d303f362
-
SHA512
7a76066026fd32b311aae0f2bccd48136c919eddc286bbac6a2b4dcd5ea38ba7d0b47fd0f48fb76d91a792e0b96a2087bdb50880ad6fbf1d18805b2511c88e2c
-
SSDEEP
12288:3bWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:3sxgsRftD0C2nKG
Behavioral task
behavioral1
Sample
2024-74-0x0000000000400000-0x000000000046D000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2024-74-0x0000000000400000-0x000000000046D000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5916787654:AAEJEadEk6VSBHL82vTGRS9aaNuh-zG53Rg/sendMessage?chat_id=5483672364
Targets
-
-
Target
2024-74-0x0000000000400000-0x000000000046D000-memory.dmp
-
Size
436KB
-
MD5
d5e2544f7a9aef99174b10460bac2570
-
SHA1
a6a1fe82d34bf81557a64cff2b811eb26de848dc
-
SHA256
195a869ef0427a97002e40c10fd7d6cbb4d85bb252518f2b65e32560d303f362
-
SHA512
7a76066026fd32b311aae0f2bccd48136c919eddc286bbac6a2b4dcd5ea38ba7d0b47fd0f48fb76d91a792e0b96a2087bdb50880ad6fbf1d18805b2511c88e2c
-
SSDEEP
12288:3bWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:3sxgsRftD0C2nKG
Score6/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-