General
-
Target
2168-140-0x0000000000400000-0x0000000000654000-memory.dmp
-
Size
2.3MB
-
Sample
230501-rg6qhaff99
-
MD5
58ed8a64599dbf61e2d8083b2c40107e
-
SHA1
c19e34b59e5ccff5657a1da29308c1015539df2a
-
SHA256
96f62d789e0958b3dc3cf346997044f128d29098116e340786993b5308209806
-
SHA512
0a461dd6fbd337452e2a580d0b381642e6ea4cd8f9b863008295fc1671c65ee6dc35886d9dd5fd46960d1c8649c8334898f2be89224a0b21cc824925333fb531
-
SSDEEP
24576:8xgsRftD0C2nKGt0Djsf9nz4mloFQnpXUMPQDR6q79dA:8aSftDnGCDYf5zaCpXxPuR6E9dA
Behavioral task
behavioral1
Sample
2168-140-0x0000000000400000-0x0000000000654000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2168-140-0x0000000000400000-0x0000000000654000-memory.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
2168-140-0x0000000000400000-0x0000000000654000-memory.dmp
-
Size
2.3MB
-
MD5
58ed8a64599dbf61e2d8083b2c40107e
-
SHA1
c19e34b59e5ccff5657a1da29308c1015539df2a
-
SHA256
96f62d789e0958b3dc3cf346997044f128d29098116e340786993b5308209806
-
SHA512
0a461dd6fbd337452e2a580d0b381642e6ea4cd8f9b863008295fc1671c65ee6dc35886d9dd5fd46960d1c8649c8334898f2be89224a0b21cc824925333fb531
-
SSDEEP
24576:8xgsRftD0C2nKGt0Djsf9nz4mloFQnpXUMPQDR6q79dA:8aSftDnGCDYf5zaCpXxPuR6E9dA
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-