General

  • Target

    Purchase order_pdf.exe

  • Size

    792KB

  • Sample

    230417-299b7sab6t

  • MD5

    3b156e7eab24fbf17d682c7d889b85d6

  • SHA1

    4385230e53f255d7db8b91844f2c67f1b16c1c96

  • SHA256

    c26bf76c00885577a5aeacd05387893d936bf122aaf3999dcb0dee3be14fcfcd

  • SHA512

    879a687179a41ece511e833f967a9d2ab6daa937c4339237fb07735fa53f09bfd6978bca4115af7e51b496e0b323df9bdd5f185029a637550c6b2901d4873bb1

  • SSDEEP

    12288:XAOsOorAeJPzsJnxfBN9UpRQQ2FDTm3U+o1N68vlU0WhmtVSkYRUVmU:XAOcr5axfBYp6fDMkzRiQVSkYqm

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474

Targets

    • Target

      Purchase order_pdf.exe

    • Size

      792KB

    • MD5

      3b156e7eab24fbf17d682c7d889b85d6

    • SHA1

      4385230e53f255d7db8b91844f2c67f1b16c1c96

    • SHA256

      c26bf76c00885577a5aeacd05387893d936bf122aaf3999dcb0dee3be14fcfcd

    • SHA512

      879a687179a41ece511e833f967a9d2ab6daa937c4339237fb07735fa53f09bfd6978bca4115af7e51b496e0b323df9bdd5f185029a637550c6b2901d4873bb1

    • SSDEEP

      12288:XAOsOorAeJPzsJnxfBN9UpRQQ2FDTm3U+o1N68vlU0WhmtVSkYRUVmU:XAOcr5axfBYp6fDMkzRiQVSkYqm

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks