General
-
Target
Purchase Order.exe
-
Size
857KB
-
Sample
230420-x5gzyadh3z
-
MD5
6762bbcbc3e23a6006e8dbe978b8b85d
-
SHA1
9e60d67c8dc70667d6a04e302fdd9165d55443ab
-
SHA256
7042b9a81eaf1ddd3de522f40e80a915e0e44c6843320013daaa8ee2a842a9e2
-
SHA512
a02cbbe84aa912877332549e0c5715faec099d4c6748d4b22afb032fc219a6ffee4da8aa101d58aa2edb1d82e660a33da55ebc07741e2c7f9c541fe775c6a190
-
SSDEEP
24576:tJqrxgV31OsCcNrd8vK4mMX+kYrj98O4AqUmhZe:tJqtgt1OPYrd8C4vX2jv/
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
Purchase Order.exe
-
Size
857KB
-
MD5
6762bbcbc3e23a6006e8dbe978b8b85d
-
SHA1
9e60d67c8dc70667d6a04e302fdd9165d55443ab
-
SHA256
7042b9a81eaf1ddd3de522f40e80a915e0e44c6843320013daaa8ee2a842a9e2
-
SHA512
a02cbbe84aa912877332549e0c5715faec099d4c6748d4b22afb032fc219a6ffee4da8aa101d58aa2edb1d82e660a33da55ebc07741e2c7f9c541fe775c6a190
-
SSDEEP
24576:tJqrxgV31OsCcNrd8vK4mMX+kYrj98O4AqUmhZe:tJqtgt1OPYrd8C4vX2jv/
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-