General

  • Target

    709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592

  • Size

    504KB

  • Sample

    230408-hv8btacb88

  • MD5

    76ef6dcc228516addb85969c619845f8

  • SHA1

    ec42d448daf3645b980588f03e4a1d50a068e302

  • SHA256

    709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592

  • SHA512

    4b37f2b3b5977a9d55021c02654095d79125838df1759684a93d08732777fe411841395179198a7c121b1f3ffd59d7c7d31b2ed9387d4e0765265c09716d1f0e

  • SSDEEP

    12288:/YuffiNQGwOEphdUyTd7RqcNEb2SqH4y8jw:/YuffiQGwOERlucuqbv

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474

Targets

    • Target

      709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592

    • Size

      504KB

    • MD5

      76ef6dcc228516addb85969c619845f8

    • SHA1

      ec42d448daf3645b980588f03e4a1d50a068e302

    • SHA256

      709b07ef6d3a105e4f17eb92f6978c9b8597c8297f6391303670e2adaed90592

    • SHA512

      4b37f2b3b5977a9d55021c02654095d79125838df1759684a93d08732777fe411841395179198a7c121b1f3ffd59d7c7d31b2ed9387d4e0765265c09716d1f0e

    • SSDEEP

      12288:/YuffiNQGwOEphdUyTd7RqcNEb2SqH4y8jw:/YuffiQGwOERlucuqbv

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks