General
-
Target
581f51fd35e943a69a4c569fa8654736.bin
-
Size
1.4MB
-
Sample
230505-w2yb3sdb23
-
MD5
b0c51e1d5af29f7e2ce5bccfcd9dadba
-
SHA1
aa375db969bf313a9cd724239467eaa919abf9df
-
SHA256
af2ff9bc5e9582e3301aea8cae68cb9fdea3e56b75dd57853c156c15757462d7
-
SHA512
b4d67722daff4725392c93740a7f3c50d840ac291a6509726386183d83af25649016264b93b97512d6f28616b3ba28e7e3d205734fa49a49d6b8951f1d58cb56
-
SSDEEP
24576:rokOoO+MVBpFt3VTn6/rbrwkUQmkEQz0zgFMgBP8tandGepRdF4:r6oeLXBqrALQKQQzWMEE6RdG
Static task
static1
Behavioral task
behavioral1
Sample
18d8044858441edcc126e76dab8c868a23acabb9abf7bab966e4c3eb24f44043.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
18d8044858441edcc126e76dab8c868a23acabb9abf7bab966e4c3eb24f44043.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
18d8044858441edcc126e76dab8c868a23acabb9abf7bab966e4c3eb24f44043.exe
-
Size
1.5MB
-
MD5
581f51fd35e943a69a4c569fa8654736
-
SHA1
610e7579a996ea788ccb688a9dda9d4855a40a2d
-
SHA256
18d8044858441edcc126e76dab8c868a23acabb9abf7bab966e4c3eb24f44043
-
SHA512
8bb8ce0f096c5a08e2457c7039f0169ae312f850e8189e240176e7a4ccf4ba113efe9f3a19e4e282ff66b60e48b0e07127270da804e0192f5ef091f7ea9e03db
-
SSDEEP
24576:Xbj8B+M73OglQfGmzu7SulbydbwcLxTDkU9tMMkB5lO2dMqtX1uP:XX++tglKKPwbwcLh4otmB7ldMg1C
Score10/10-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-