General
-
Target
Purchase Order 202319876.exe
-
Size
1.7MB
-
Sample
230510-meszeafd88
-
MD5
09338b623f4473341a54191980901783
-
SHA1
40c8fca01c37d1f1592dacc06f48b918311e37e7
-
SHA256
f1de1c385fac0c850ee30233c971a76beee78824500899f5c64db03c70ac2e03
-
SHA512
03da01911a00993ce7ddcd58a3cb6e185389bc341f8b1bde6c287eeca220cf960c690f91d0442b48f812993750d37dc4da4ce86bf6dfc53d00aa9829a31f8fe0
-
SSDEEP
24576:+b3IBXM8LcvUtY+FGkacy9RjdMD84XKpJKbJ6byq0TyJN8Wo+uOZakN:WQXZcvUtYRcGLoHvJQb8WoIN
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order 202319876.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Purchase Order 202319876.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
Purchase Order 202319876.exe
-
Size
1.7MB
-
MD5
09338b623f4473341a54191980901783
-
SHA1
40c8fca01c37d1f1592dacc06f48b918311e37e7
-
SHA256
f1de1c385fac0c850ee30233c971a76beee78824500899f5c64db03c70ac2e03
-
SHA512
03da01911a00993ce7ddcd58a3cb6e185389bc341f8b1bde6c287eeca220cf960c690f91d0442b48f812993750d37dc4da4ce86bf6dfc53d00aa9829a31f8fe0
-
SSDEEP
24576:+b3IBXM8LcvUtY+FGkacy9RjdMD84XKpJKbJ6byq0TyJN8Wo+uOZakN:WQXZcvUtYRcGLoHvJQb8WoIN
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-