General

  • Target

    Purchase Order 202319876.gz

  • Size

    1.3MB

  • Sample

    230501-kwyvwaeh52

  • MD5

    8781895438f2e582c0017d5b83c1cab4

  • SHA1

    e89295e1c23c09340a28a00f11e530ea0dccdca7

  • SHA256

    a0b3efe8781aed703dc0309955d29b7d4554e722733a556187e9cb16f25dd6c5

  • SHA512

    98c3b75dc556c53407db3f98672b0798da118ad65a9bf1080ea07c8be94e32622769a6b9dcd01fdb221296aea94beea1d5e48b5a929a92dc8e8520b5135cf7cb

  • SSDEEP

    24576:0ITJXjb1GPjYZ3NqiMoPoD4OWWX9+xzMrxfG5tP8E5JpKo4yNn0g+kHeRKOq2INJ:rFXf16jisToAcbWXYirY5t0GpKoBN02t

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      Purchase Order 202319876.exe

    • Size

      1.5MB

    • MD5

      581f51fd35e943a69a4c569fa8654736

    • SHA1

      610e7579a996ea788ccb688a9dda9d4855a40a2d

    • SHA256

      18d8044858441edcc126e76dab8c868a23acabb9abf7bab966e4c3eb24f44043

    • SHA512

      8bb8ce0f096c5a08e2457c7039f0169ae312f850e8189e240176e7a4ccf4ba113efe9f3a19e4e282ff66b60e48b0e07127270da804e0192f5ef091f7ea9e03db

    • SSDEEP

      24576:Xbj8B+M73OglQfGmzu7SulbydbwcLxTDkU9tMMkB5lO2dMqtX1uP:XX++tglKKPwbwcLh4otmB7ldMg1C

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks