General

  • Target

    2492-140-0x0000000000400000-0x0000000000654000-memory.dmp

  • Size

    2.3MB

  • MD5

    2648da902ed9cd72e1b0a129eea583a0

  • SHA1

    701abc6becba1051ddcbc5652ec78dda7944ca76

  • SHA256

    ef241b30e7e55b276b860ee69841d5062ecbe09d9bb5c156c03e2029730730a9

  • SHA512

    1bc3751bb2494eb6a15a1661a135fecd1d5cddd51f0f3b7250c115a28808b149fd70ae7182f1b62442ffd2ecf0acd8c65c2799265668f410106cfc19328f0fa6

  • SSDEEP

    24576:yxgsRftD0C2nKGH0Djsf9nz4mloFQnpXUMPQDR6q79dA:yaSftDnGUDYf5zaCpXxPuR6E9dA

Score
10/10

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • Blustealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2492-140-0x0000000000400000-0x0000000000654000-memory.dmp
    .exe windows x86

    df8fbcbe90e1e305a660f0ac2aa4fae4


    Headers

    Imports

    Sections