General

  • Target

    e0236718f5d4d70c2dc485d322834897.bin.bin

  • Size

    804KB

  • Sample

    230505-yvs5wsdg2z

  • MD5

    700bb5f99c01b9a0efb434bb41d96b25

  • SHA1

    4557672cc482f6e2266d48fafe5835a49cd22e30

  • SHA256

    5a5ac8f9a24fe3d9eb8c6e2bd6d947af89612157cf70302449c3fe787bc7ae76

  • SHA512

    409d550bdf445c0ba0f0d9f204a57b3fb49dfcc7aa996f573d8922610b068c82425e42716957d80359f1ce1743dc4cd089fbd65e904503afe6d7521bd5c1d85f

  • SSDEEP

    12288:lON4G3UqcCXlNvqKokzbgNujUPUcjFfsAIN35KgJC1G1D:Y4GvVqDw0Nh8ck5K+C1GR

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      5923a0d6ac3cd029ce06706021aaaff83c55193a23c2d5fedd5b3cdd0065b081.exe

    • Size

      890KB

    • MD5

      e0236718f5d4d70c2dc485d322834897

    • SHA1

      f0276ffdd801d3440918269f5d880f0502bda55e

    • SHA256

      5923a0d6ac3cd029ce06706021aaaff83c55193a23c2d5fedd5b3cdd0065b081

    • SHA512

      a7fae05a2aeb61acac13e682dcbff7bd000ecbb0ebc1350a62e528bc6abffe94db1e0cc0b71fa0b6cb90479e666b71dfa7406b8aeddff0bd9490d556a2fdc553

    • SSDEEP

      24576:b4QWOM4PEXi53mZbPovZuFeBwEtumDDd+c6UcqK:b4QWV4Eq3mavEeBwEtfZ+cfcn

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks