General

  • Target

    34aa0ca40863c30653a0b6ba10d3daa2.bin

  • Size

    1.3MB

  • Sample

    230505-wxc6cace37

  • MD5

    c594f8280b7588bc3aa3226e79de363b

  • SHA1

    3efff18ea2b142610923b9dad57227f8c32cb048

  • SHA256

    ba90f21e249436110f895833ddbb4f0da58497250cbc56f1dc60fec823e64a08

  • SHA512

    405025856817422d13b035b2f04b251e2ec22da9e069ff4392a8831b12482db7066073d4d3c486213732acfc378d163a79a9791bd56925ee669247edc6c1a8de

  • SSDEEP

    24576:lY8CV1t5MpNcDi/FzeyImzgYy3xtQp5IpEgVCS6da+Etlf4GhMlq76yWVGZhee6Z:mp8AiXImzgYDRgZQch2qGVGZz6hHr

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe

    • Size

      1.4MB

    • MD5

      34aa0ca40863c30653a0b6ba10d3daa2

    • SHA1

      c5dbbc9a3f6d537ab49aeb89223810cd67c256f7

    • SHA256

      427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9

    • SHA512

      34e46909f3ea586033baa5f73ecbf1f5072f2d05cfaf77f6ab2535ee0798f01427b1e62719fc4026f4b38af03e445a33ff2deb22ef9817ab42e506cfb5cb10d2

    • SSDEEP

      24576:O94Lauo2BLrZ6dj7Wd50QKQIsBJXkQsUc/i/Egj87qLom0Y5m6Uy:O/uHrZ6WPKQ5X0QsUN/EgQ7qEmv

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks