General
-
Target
bc61c93084dbe9aebf93114d082667bd696610a81e8fb4bda751204f86d3ea61.zip
-
Size
1.3MB
-
Sample
230502-18773scg87
-
MD5
26051b7de10ec75d457064cb2389c541
-
SHA1
6e4ed83d85628617c1e8a41ce67427bf8057aee0
-
SHA256
164790d71da9d108d7baa215cf5336f0fd568d542cd18752688f9f7769dc28b7
-
SHA512
b9f875f5a8c35b19bc612b11f0a676e6d32da3e2b0ad02d20cf20f7d85ccf264e903b5b365fcee1021c351d0c930ba695f2328dd2fe1d12b32991d43b0c91d3c
-
SSDEEP
24576:JrMGvSVKb+A+sR21H25r6rP7yrCTlyKSSbUZEIlPzvzv0xuAzEQEr:5MGqVeN+sRrer7ailyUUVlbbv0xyr
Static task
static1
Behavioral task
behavioral1
Sample
bc61c93084dbe9aebf93114d082667bd696610a81e8fb4bda751204f86d3ea61.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bc61c93084dbe9aebf93114d082667bd696610a81e8fb4bda751204f86d3ea61.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
bc61c93084dbe9aebf93114d082667bd696610a81e8fb4bda751204f86d3ea61.exe
-
Size
1.5MB
-
MD5
39810b7912907fc879004874df0e9e9e
-
SHA1
f2e51d5e9f644058a8ff4d64458e2914ddf2a364
-
SHA256
bc61c93084dbe9aebf93114d082667bd696610a81e8fb4bda751204f86d3ea61
-
SHA512
abd49e8623428a399f665e2157522b6d285cb6c1f77c043eb22038df2ebbfbb21f3823c08dd781be5df043f1ab9b514990ab890bc80086cf33860aa6f4e75b5d
-
SSDEEP
24576:molqfbt8n/WmtqmZfq/ppZge1+qWMZukXfRtgyCrWw:sxgWm8m+Zj+qbZuq
Score10/10-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-