General
-
Target
e0236718f5d4d70c2dc485d322834897.bin.bin
-
Size
804KB
-
Sample
230505-yvs5wsdg2z
-
MD5
700bb5f99c01b9a0efb434bb41d96b25
-
SHA1
4557672cc482f6e2266d48fafe5835a49cd22e30
-
SHA256
5a5ac8f9a24fe3d9eb8c6e2bd6d947af89612157cf70302449c3fe787bc7ae76
-
SHA512
409d550bdf445c0ba0f0d9f204a57b3fb49dfcc7aa996f573d8922610b068c82425e42716957d80359f1ce1743dc4cd089fbd65e904503afe6d7521bd5c1d85f
-
SSDEEP
12288:lON4G3UqcCXlNvqKokzbgNujUPUcjFfsAIN35KgJC1G1D:Y4GvVqDw0Nh8ck5K+C1GR
Static task
static1
Behavioral task
behavioral1
Sample
5923a0d6ac3cd029ce06706021aaaff83c55193a23c2d5fedd5b3cdd0065b081.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5923a0d6ac3cd029ce06706021aaaff83c55193a23c2d5fedd5b3cdd0065b081.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
5923a0d6ac3cd029ce06706021aaaff83c55193a23c2d5fedd5b3cdd0065b081.exe
-
Size
890KB
-
MD5
e0236718f5d4d70c2dc485d322834897
-
SHA1
f0276ffdd801d3440918269f5d880f0502bda55e
-
SHA256
5923a0d6ac3cd029ce06706021aaaff83c55193a23c2d5fedd5b3cdd0065b081
-
SHA512
a7fae05a2aeb61acac13e682dcbff7bd000ecbb0ebc1350a62e528bc6abffe94db1e0cc0b71fa0b6cb90479e666b71dfa7406b8aeddff0bd9490d556a2fdc553
-
SSDEEP
24576:b4QWOM4PEXi53mZbPovZuFeBwEtumDDd+c6UcqK:b4QWV4Eq3mavEeBwEtfZ+cfcn
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-