General

  • Target

    8673653b4e2feb2342836fa526e90d2412ff6f61d77e693efb0172827f45c135.zip

  • Size

    1.4MB

  • Sample

    230417-xepbbshd3s

  • MD5

    964ef6bf7a1892fbcd393b0d390fa430

  • SHA1

    8b13a01180751222a8b6ec34e71441864fb5ae0d

  • SHA256

    f101138228ca15bebf19e1802f716601ed0094373bac649e9e0d9f1bfb2e74c3

  • SHA512

    37cdbaa1837a1fcb7d6de560fe98fb7f5e536c7dfb9f42d7a9789aa423e40b91876e375720162255290ddfeff98d105a7ec7e6a733d9fae6ff5c4acf5449904b

  • SSDEEP

    24576:BeKxRBwZGjbdiiXkknLZGfpZOBH2RnBHI/vICqfg1ihzBhFkI:BeKxRuZGjIGVKpzYvIC91QBhFd

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      8673653b4e2feb2342836fa526e90d2412ff6f61d77e693efb0172827f45c135.exe

    • Size

      1.5MB

    • MD5

      76a953005611843cca8ba94dc2ffbfcf

    • SHA1

      af634f838961dbeb328c9fb09ab23cb1aca2affe

    • SHA256

      8673653b4e2feb2342836fa526e90d2412ff6f61d77e693efb0172827f45c135

    • SHA512

      06095412d5fe83e4741ab31a4fe890283c0b8b659ea7fc2289dc52e1ed2c07cd8619e8fdbc9368a4980c6e8b43161472d55d96552df2b57759e84c9a85a16a3b

    • SSDEEP

      24576:8r1voTP6JZs4KoxhV2EiP0Av/1IZwA7dTej7Tz5IDuvkuwV7GkeoAu2j7NiznXBy:8r1voTP67sJoxTiP00/OH1eHVSJXT281

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks