General

  • Target

    3.exe

  • Size

    855KB

  • Sample

    230515-mm9bcsac4v

  • MD5

    2616d8fe5d13f7a2c5f35428c4e76f0f

  • SHA1

    58ebeeb5b7dd11a8fd372e647c766eb294e2c802

  • SHA256

    36dcb265b7a10f3e1ccf2f51e28b7c086675ac2729e19075cf34cb59ba17105f

  • SHA512

    f5a88e15ec32392095c620b5e765ccb3ff9bac896146f6b226e3a012ab8d7c08e263fa4d3c3b55d1d8f4532cef849af1a9f32b3d492245c787e99cf53c953a4c

  • SSDEEP

    12288:j8ysS5ZKeMMOZ/g2cUOjoYIh5V0wmf2MhDHVb0V5fPTMXtg0mpEpo+g9cK8CD:5jKpejo1b0phDHVePj0mpEpo+4cOD

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5450700540:AAEJyEEV8BKgYUKmnCPZxp19kD9GVSRup5M/sendMessage?chat_id=5422342474

Targets

    • Target

      3.exe

    • Size

      855KB

    • MD5

      2616d8fe5d13f7a2c5f35428c4e76f0f

    • SHA1

      58ebeeb5b7dd11a8fd372e647c766eb294e2c802

    • SHA256

      36dcb265b7a10f3e1ccf2f51e28b7c086675ac2729e19075cf34cb59ba17105f

    • SHA512

      f5a88e15ec32392095c620b5e765ccb3ff9bac896146f6b226e3a012ab8d7c08e263fa4d3c3b55d1d8f4532cef849af1a9f32b3d492245c787e99cf53c953a4c

    • SSDEEP

      12288:j8ysS5ZKeMMOZ/g2cUOjoYIh5V0wmf2MhDHVb0V5fPTMXtg0mpEpo+g9cK8CD:5jKpejo1b0phDHVePj0mpEpo+4cOD

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks