General
-
Target
Purchase order_pdf.exe
-
Size
792KB
-
Sample
230417-299b7sab6t
-
MD5
3b156e7eab24fbf17d682c7d889b85d6
-
SHA1
4385230e53f255d7db8b91844f2c67f1b16c1c96
-
SHA256
c26bf76c00885577a5aeacd05387893d936bf122aaf3999dcb0dee3be14fcfcd
-
SHA512
879a687179a41ece511e833f967a9d2ab6daa937c4339237fb07735fa53f09bfd6978bca4115af7e51b496e0b323df9bdd5f185029a637550c6b2901d4873bb1
-
SSDEEP
12288:XAOsOorAeJPzsJnxfBN9UpRQQ2FDTm3U+o1N68vlU0WhmtVSkYRUVmU:XAOcr5axfBYp6fDMkzRiQVSkYqm
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order_pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase order_pdf.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Targets
-
-
Target
Purchase order_pdf.exe
-
Size
792KB
-
MD5
3b156e7eab24fbf17d682c7d889b85d6
-
SHA1
4385230e53f255d7db8b91844f2c67f1b16c1c96
-
SHA256
c26bf76c00885577a5aeacd05387893d936bf122aaf3999dcb0dee3be14fcfcd
-
SHA512
879a687179a41ece511e833f967a9d2ab6daa937c4339237fb07735fa53f09bfd6978bca4115af7e51b496e0b323df9bdd5f185029a637550c6b2901d4873bb1
-
SSDEEP
12288:XAOsOorAeJPzsJnxfBN9UpRQQ2FDTm3U+o1N68vlU0WhmtVSkYRUVmU:XAOcr5axfBYp6fDMkzRiQVSkYqm
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-