General
-
Target
3672-141-0x0000000000400000-0x0000000000654000-memory.dmp
-
Size
2.3MB
-
Sample
230416-plzfwaab37
-
MD5
6783471e10d1b22dcbb48cbe9f4acced
-
SHA1
a56ab8039d071669d61ff00922977bc26f40262e
-
SHA256
b55e703ad7e1fdeb72bd2f622a679246caf8a66115aa99b100fa7770704e0c7b
-
SHA512
eb3885755da41a308bf177880f546b52baa3c8f87756d89044b87b7eb6f880f2395381ef11ad345057569ea7dc10d8bb340f9a8879791d86e060849e1ad8a3dc
-
SSDEEP
24576:7xgsRftD0C2nKGz0Djsf9nz4mloFQnpXUMPQDR6q79dA:7aSftDnGgDYf5zaCpXxPuR6E9dA
Behavioral task
behavioral1
Sample
3672-141-0x0000000000400000-0x0000000000654000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3672-141-0x0000000000400000-0x0000000000654000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
3672-141-0x0000000000400000-0x0000000000654000-memory.dmp
-
Size
2.3MB
-
MD5
6783471e10d1b22dcbb48cbe9f4acced
-
SHA1
a56ab8039d071669d61ff00922977bc26f40262e
-
SHA256
b55e703ad7e1fdeb72bd2f622a679246caf8a66115aa99b100fa7770704e0c7b
-
SHA512
eb3885755da41a308bf177880f546b52baa3c8f87756d89044b87b7eb6f880f2395381ef11ad345057569ea7dc10d8bb340f9a8879791d86e060849e1ad8a3dc
-
SSDEEP
24576:7xgsRftD0C2nKGz0Djsf9nz4mloFQnpXUMPQDR6q79dA:7aSftDnGgDYf5zaCpXxPuR6E9dA
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-