General

  • Target

    581f51fd35e943a69a4c569fa8654736.bin

  • Size

    1.4MB

  • Sample

    230503-b21rzsfa7s

  • MD5

    b0c51e1d5af29f7e2ce5bccfcd9dadba

  • SHA1

    aa375db969bf313a9cd724239467eaa919abf9df

  • SHA256

    af2ff9bc5e9582e3301aea8cae68cb9fdea3e56b75dd57853c156c15757462d7

  • SHA512

    b4d67722daff4725392c93740a7f3c50d840ac291a6509726386183d83af25649016264b93b97512d6f28616b3ba28e7e3d205734fa49a49d6b8951f1d58cb56

  • SSDEEP

    24576:rokOoO+MVBpFt3VTn6/rbrwkUQmkEQz0zgFMgBP8tandGepRdF4:r6oeLXBqrALQKQQzWMEE6RdG

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      18d8044858441edcc126e76dab8c868a23acabb9abf7bab966e4c3eb24f44043.exe

    • Size

      1.5MB

    • MD5

      581f51fd35e943a69a4c569fa8654736

    • SHA1

      610e7579a996ea788ccb688a9dda9d4855a40a2d

    • SHA256

      18d8044858441edcc126e76dab8c868a23acabb9abf7bab966e4c3eb24f44043

    • SHA512

      8bb8ce0f096c5a08e2457c7039f0169ae312f850e8189e240176e7a4ccf4ba113efe9f3a19e4e282ff66b60e48b0e07127270da804e0192f5ef091f7ea9e03db

    • SSDEEP

      24576:Xbj8B+M73OglQfGmzu7SulbydbwcLxTDkU9tMMkB5lO2dMqtX1uP:XX++tglKKPwbwcLh4otmB7ldMg1C

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks