General
-
Target
Purchase Order 202319876.gz
-
Size
1.3MB
-
Sample
230501-kwyvwaeh52
-
MD5
8781895438f2e582c0017d5b83c1cab4
-
SHA1
e89295e1c23c09340a28a00f11e530ea0dccdca7
-
SHA256
a0b3efe8781aed703dc0309955d29b7d4554e722733a556187e9cb16f25dd6c5
-
SHA512
98c3b75dc556c53407db3f98672b0798da118ad65a9bf1080ea07c8be94e32622769a6b9dcd01fdb221296aea94beea1d5e48b5a929a92dc8e8520b5135cf7cb
-
SSDEEP
24576:0ITJXjb1GPjYZ3NqiMoPoD4OWWX9+xzMrxfG5tP8E5JpKo4yNn0g+kHeRKOq2INJ:rFXf16jisToAcbWXYirY5t0GpKoBN02t
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order 202319876.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase Order 202319876.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
Purchase Order 202319876.exe
-
Size
1.5MB
-
MD5
581f51fd35e943a69a4c569fa8654736
-
SHA1
610e7579a996ea788ccb688a9dda9d4855a40a2d
-
SHA256
18d8044858441edcc126e76dab8c868a23acabb9abf7bab966e4c3eb24f44043
-
SHA512
8bb8ce0f096c5a08e2457c7039f0169ae312f850e8189e240176e7a4ccf4ba113efe9f3a19e4e282ff66b60e48b0e07127270da804e0192f5ef091f7ea9e03db
-
SSDEEP
24576:Xbj8B+M73OglQfGmzu7SulbydbwcLxTDkU9tMMkB5lO2dMqtX1uP:XX++tglKKPwbwcLh4otmB7ldMg1C
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-