General
-
Target
Order-688930021178.gz
-
Size
1.3MB
-
Sample
230515-vmm25age76
-
MD5
9b98cb7172b8c9d0f90a61026bd429b8
-
SHA1
e019c5ddbc5089dd1ea914e5e5c02f9d0f425e0f
-
SHA256
2c96adb4c6b8c3dd82890cc40049dbe67a141ccbf07155ad68ff8188853fd790
-
SHA512
334f095c9977dbbe1e01a55457489125c260149b8565a907c6009b63b84897735137e9b608c19cdde93489d114ed23970dfdf3e3b9db6c0743e9f1cb772b069d
-
SSDEEP
24576:MT3DpZ5QzKvlwfOqWD8L7R1gfirxfj3QDm0Igl19/4l3FXOqitp3gqpQ:MTTprDmfOqFLLgfirVj3VKzWlVtQwCQ
Static task
static1
Behavioral task
behavioral1
Sample
Order-688930021178.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Order-688930021178.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
Order-688930021178.exe
-
Size
1.4MB
-
MD5
bd064f5b67dcb30de45b19e11d424f53
-
SHA1
cfe03d52e6af08c9ad2d7c7f3b7afbd4d7e5794d
-
SHA256
9d603074042f5d594bc2710ed1545ce7648f35ea0ad789ed1ffbfa2d294faf55
-
SHA512
20a2b6c6bcddaa77f5a5b7dee4d1a6bc14eeae093cdd5b20cdf2567606f3253d48cf60463f6aa380bf43d541733cbb06543fd21ce271821311057e250c886cb8
-
SSDEEP
24576:+JDy73Le60VNu1ZtGYNitrP7DVvIiK7vog0soXrmiSyqDG2whTfrO:+U7q60VNu1ZtZ4tr7DVGog0sovnq2zO
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-