General
-
Target
2.exe
-
Size
1.6MB
-
Sample
230510-mqf4zsfe53
-
MD5
c7c88b125e27183372fb3d59c959f637
-
SHA1
47da39de6edee6bbe9680d830e8f64b7f3fccf3a
-
SHA256
e44e1135888701ba8cbf462efa9d992a2fa1f83e52c471f65c62c16fdecade26
-
SHA512
f6beaf1a6e4d8fdde08fb44c90f93c75c6f88bf04d35a90de0711a683c4a19cc82f0e846b038af4b30f6e18d5905d6006de5e00dad5cfd629d673dd81015ed63
-
SSDEEP
24576:04LpeAT/4TUmBmsV7ckan9wLb+mkA2NffoYF2zEg06nLnH8b/5cN:ptADBmsmkanaLb+XJwS2zECLH8bI
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
2.exe
-
Size
1.6MB
-
MD5
c7c88b125e27183372fb3d59c959f637
-
SHA1
47da39de6edee6bbe9680d830e8f64b7f3fccf3a
-
SHA256
e44e1135888701ba8cbf462efa9d992a2fa1f83e52c471f65c62c16fdecade26
-
SHA512
f6beaf1a6e4d8fdde08fb44c90f93c75c6f88bf04d35a90de0711a683c4a19cc82f0e846b038af4b30f6e18d5905d6006de5e00dad5cfd629d673dd81015ed63
-
SSDEEP
24576:04LpeAT/4TUmBmsV7ckan9wLb+mkA2NffoYF2zEg06nLnH8b/5cN:ptADBmsmkanaLb+XJwS2zECLH8bI
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-