General
-
Target
Quote 1345 rev.7.exe
-
Size
1.5MB
-
Sample
230509-3c4wwsfb81
-
MD5
e67a119b25c041892a38c6147fd54c60
-
SHA1
8c3c63629929b9754c62fbad1e731f33758d2d2d
-
SHA256
2bfafdc20b461ef574d77bd7c29d586c6a7c3ad6b3ad9bbecab8c014308b07d9
-
SHA512
414e8de5219f34c4abcf885444dfab93e794abf69808d9c2e9e70f8de806da9e2159ba3d58dec41991be675955d7bb99b596e6b358a4cf7b3a32881cbbad1776
-
SSDEEP
24576:OwwBIEAbPY00PXKtW93ZwJGRNI7MhXOd+DsyFqcpVsZB4yYH:0BIENBvDIwmeqcpVSed
Static task
static1
Behavioral task
behavioral1
Sample
Quote 1345 rev.7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Quote 1345 rev.7.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
Quote 1345 rev.7.exe
-
Size
1.5MB
-
MD5
e67a119b25c041892a38c6147fd54c60
-
SHA1
8c3c63629929b9754c62fbad1e731f33758d2d2d
-
SHA256
2bfafdc20b461ef574d77bd7c29d586c6a7c3ad6b3ad9bbecab8c014308b07d9
-
SHA512
414e8de5219f34c4abcf885444dfab93e794abf69808d9c2e9e70f8de806da9e2159ba3d58dec41991be675955d7bb99b596e6b358a4cf7b3a32881cbbad1776
-
SSDEEP
24576:OwwBIEAbPY00PXKtW93ZwJGRNI7MhXOd+DsyFqcpVsZB4yYH:0BIENBvDIwmeqcpVSed
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-