General
-
Target
6762bbcbc3e23a6006e8dbe978b8b85d.bin
-
Size
786KB
-
Sample
230422-bvzlcabe85
-
MD5
2c1ea35791210bf816ea0ac3b5728bb0
-
SHA1
dd59f99edec2e9671d81da8631c8d518d1274779
-
SHA256
d85f8012ae2bd3aa07e73fc7967891eec06562d90968a0f8589eac232bc8d014
-
SHA512
627249caacfd2f14b26cd0f3819da95f43cf528e4588fa919cd5cbb6e65f9f342fc7b753537d222aff149f666d3835f9bf3268d0734eafa967b11aa691621405
-
SSDEEP
12288:YrcGDxeqxKXckxDoR92vSW7kphxNN4tmgkzlpqKevaz66wbMPLDJzTDyM6fEV69C:YrZbGxutWWFbgkBcKOazxLDJ/Dyvn4um
Static task
static1
Behavioral task
behavioral1
Sample
7042b9a81eaf1ddd3de522f40e80a915e0e44c6843320013daaa8ee2a842a9e2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7042b9a81eaf1ddd3de522f40e80a915e0e44c6843320013daaa8ee2a842a9e2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
7042b9a81eaf1ddd3de522f40e80a915e0e44c6843320013daaa8ee2a842a9e2.exe
-
Size
857KB
-
MD5
6762bbcbc3e23a6006e8dbe978b8b85d
-
SHA1
9e60d67c8dc70667d6a04e302fdd9165d55443ab
-
SHA256
7042b9a81eaf1ddd3de522f40e80a915e0e44c6843320013daaa8ee2a842a9e2
-
SHA512
a02cbbe84aa912877332549e0c5715faec099d4c6748d4b22afb032fc219a6ffee4da8aa101d58aa2edb1d82e660a33da55ebc07741e2c7f9c541fe775c6a190
-
SSDEEP
24576:tJqrxgV31OsCcNrd8vK4mMX+kYrj98O4AqUmhZe:tJqtgt1OPYrd8C4vX2jv/
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-