General
-
Target
INWARD RMT.exe
-
Size
945KB
-
Sample
230419-qfa2rsce5y
-
MD5
eb56c4825ec85ad8a31769d718cfff54
-
SHA1
7a3ec799412a4fdd3af8a370aa064f66edb4b653
-
SHA256
08e9b87ddb401b7d06928ddc9034e7057b57667ed2b3c2f4b8ec9209aeaca055
-
SHA512
e16b1e4c1af98441633feb7edfcfaf29683d88fe7ce3f25afbd9950896f7d08d9ec6b4ff70e3298535db62f2cda31a4af4bee3353141b7d411534adc0d0894f5
-
SSDEEP
24576:ZWqTC/fbyAvWIKZKGcd9FGo28HusyPVPbVKY0Zv:ZjOvW9FyWl8ORPLKYQv
Static task
static1
Behavioral task
behavioral1
Sample
INWARD RMT.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
INWARD RMT.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474
Targets
-
-
Target
INWARD RMT.exe
-
Size
945KB
-
MD5
eb56c4825ec85ad8a31769d718cfff54
-
SHA1
7a3ec799412a4fdd3af8a370aa064f66edb4b653
-
SHA256
08e9b87ddb401b7d06928ddc9034e7057b57667ed2b3c2f4b8ec9209aeaca055
-
SHA512
e16b1e4c1af98441633feb7edfcfaf29683d88fe7ce3f25afbd9950896f7d08d9ec6b4ff70e3298535db62f2cda31a4af4bee3353141b7d411534adc0d0894f5
-
SSDEEP
24576:ZWqTC/fbyAvWIKZKGcd9FGo28HusyPVPbVKY0Zv:ZjOvW9FyWl8ORPLKYQv
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-