General

  • Target

    520-62-0x0000000000400000-0x0000000000654000-memory.dmp

  • Size

    2.3MB

  • MD5

    66e48c2e6b5977eacee48e7dc0e86a02

  • SHA1

    d0f8e3a846a4d6615aef1eeb2fa66d69212c8dc1

  • SHA256

    63e6ce42b31c1f038569d0fe48abc3b315072b99391d5df382ce4f8977174cb2

  • SHA512

    6288eab124b3a9b622db9b28cae4822d7dac4d1a2783385a375afa4860564f8ca55cbf459447d8f58f89d25c6bffc0234609bb73c3169147d07a9b9162af8901

  • SSDEEP

    12288:CWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:pxgsRftD0C2nKG

Score
10/10

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • Blustealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 520-62-0x0000000000400000-0x0000000000654000-memory.dmp
    .exe windows x86

    df8fbcbe90e1e305a660f0ac2aa4fae4


    Headers

    Imports

    Sections