General
-
Target
QUOTATION _RFQ# 1043999.exe
-
Size
851KB
-
Sample
230422-m7ebqaee44
-
MD5
3d695f1b4db5a0635d43e1cd1b9d48ae
-
SHA1
377936812ab222b69380049be6ad28208e135603
-
SHA256
a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0
-
SHA512
268e47ebb3d159ee3c33a0b0b5d8c4a272430544c01ff2c66c7918fabcba66e784edebd435e1200f0c0ce44c317b771f3b076d4548f9fbcd905079d47a434185
-
SSDEEP
12288:Y+vTN8RVtfK8cyo7qyy8SpCrqLKL2MhkHEmY4FrHSzn7rwR8mGyqF7qbnZ4Xb:Y6TNUVU8cmJ4rM3akk14JH+n78Z4Xb
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION _RFQ# 1043999.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
QUOTATION _RFQ# 1043999.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
QUOTATION _RFQ# 1043999.exe
-
Size
851KB
-
MD5
3d695f1b4db5a0635d43e1cd1b9d48ae
-
SHA1
377936812ab222b69380049be6ad28208e135603
-
SHA256
a83688213da481b066908e16d7a2206180627bcef8c69e4fe756dc06c5c35ec0
-
SHA512
268e47ebb3d159ee3c33a0b0b5d8c4a272430544c01ff2c66c7918fabcba66e784edebd435e1200f0c0ce44c317b771f3b076d4548f9fbcd905079d47a434185
-
SSDEEP
12288:Y+vTN8RVtfK8cyo7qyy8SpCrqLKL2MhkHEmY4FrHSzn7rwR8mGyqF7qbnZ4Xb:Y6TNUVU8cmJ4rM3akk14JH+n78Z4Xb
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-