General
-
Target
34aa0ca40863c30653a0b6ba10d3daa2.bin
-
Size
1.3MB
-
Sample
230505-wxc6cace37
-
MD5
c594f8280b7588bc3aa3226e79de363b
-
SHA1
3efff18ea2b142610923b9dad57227f8c32cb048
-
SHA256
ba90f21e249436110f895833ddbb4f0da58497250cbc56f1dc60fec823e64a08
-
SHA512
405025856817422d13b035b2f04b251e2ec22da9e069ff4392a8831b12482db7066073d4d3c486213732acfc378d163a79a9791bd56925ee669247edc6c1a8de
-
SSDEEP
24576:lY8CV1t5MpNcDi/FzeyImzgYy3xtQp5IpEgVCS6da+Etlf4GhMlq76yWVGZhee6Z:mp8AiXImzgYDRgZQch2qGVGZz6hHr
Static task
static1
Behavioral task
behavioral1
Sample
427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9.exe
-
Size
1.4MB
-
MD5
34aa0ca40863c30653a0b6ba10d3daa2
-
SHA1
c5dbbc9a3f6d537ab49aeb89223810cd67c256f7
-
SHA256
427279a267a65691961da1112b7c562ba7c707709b681c71a7194aa136066eb9
-
SHA512
34e46909f3ea586033baa5f73ecbf1f5072f2d05cfaf77f6ab2535ee0798f01427b1e62719fc4026f4b38af03e445a33ff2deb22ef9817ab42e506cfb5cb10d2
-
SSDEEP
24576:O94Lauo2BLrZ6dj7Wd50QKQIsBJXkQsUc/i/Egj87qLom0Y5m6Uy:O/uHrZ6WPKQ5X0QsUN/EgQ7qEmv
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-