General

  • Target

    Purchase Order 202319876.exe

  • Size

    1.5MB

  • Sample

    230501-qyhvbsff48

  • MD5

    581f51fd35e943a69a4c569fa8654736

  • SHA1

    610e7579a996ea788ccb688a9dda9d4855a40a2d

  • SHA256

    18d8044858441edcc126e76dab8c868a23acabb9abf7bab966e4c3eb24f44043

  • SHA512

    8bb8ce0f096c5a08e2457c7039f0169ae312f850e8189e240176e7a4ccf4ba113efe9f3a19e4e282ff66b60e48b0e07127270da804e0192f5ef091f7ea9e03db

  • SSDEEP

    24576:Xbj8B+M73OglQfGmzu7SulbydbwcLxTDkU9tMMkB5lO2dMqtX1uP:XX++tglKKPwbwcLh4otmB7ldMg1C

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      Purchase Order 202319876.exe

    • Size

      1.5MB

    • MD5

      581f51fd35e943a69a4c569fa8654736

    • SHA1

      610e7579a996ea788ccb688a9dda9d4855a40a2d

    • SHA256

      18d8044858441edcc126e76dab8c868a23acabb9abf7bab966e4c3eb24f44043

    • SHA512

      8bb8ce0f096c5a08e2457c7039f0169ae312f850e8189e240176e7a4ccf4ba113efe9f3a19e4e282ff66b60e48b0e07127270da804e0192f5ef091f7ea9e03db

    • SSDEEP

      24576:Xbj8B+M73OglQfGmzu7SulbydbwcLxTDkU9tMMkB5lO2dMqtX1uP:XX++tglKKPwbwcLh4otmB7ldMg1C

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks