General

  • Target

    472-63-0x0000000000400000-0x0000000000654000-memory.dmp

  • Size

    2.3MB

  • MD5

    3260b056b19c99367f9f1a6206ffb607

  • SHA1

    99110793caa0ee52adb1f15930bddac7178ce35e

  • SHA256

    c86590f80562c52a476f5835cc041226283ee83bc45cc5b483b5277363ced7cd

  • SHA512

    1177d5d6bcc305181eed6235aafe362d24ff165d28fa4882857884561f392f57e7d6c4432ab98c13ab4bb51556db641484454d63cb21f0b7f3f62a158ff8d01e

  • SSDEEP

    12288:zWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:UxgsRftD0C2nKG

Score
10/10

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • Blustealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 472-63-0x0000000000400000-0x0000000000654000-memory.dmp
    .exe windows x86

    df8fbcbe90e1e305a660f0ac2aa4fae4


    Headers

    Imports

    Sections