General

  • Target

    Order-688930021178.gz

  • Size

    1.3MB

  • Sample

    230515-vmm25age76

  • MD5

    9b98cb7172b8c9d0f90a61026bd429b8

  • SHA1

    e019c5ddbc5089dd1ea914e5e5c02f9d0f425e0f

  • SHA256

    2c96adb4c6b8c3dd82890cc40049dbe67a141ccbf07155ad68ff8188853fd790

  • SHA512

    334f095c9977dbbe1e01a55457489125c260149b8565a907c6009b63b84897735137e9b608c19cdde93489d114ed23970dfdf3e3b9db6c0743e9f1cb772b069d

  • SSDEEP

    24576:MT3DpZ5QzKvlwfOqWD8L7R1gfirxfj3QDm0Igl19/4l3FXOqitp3gqpQ:MTTprDmfOqFLLgfirVj3VKzWlVtQwCQ

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      Order-688930021178.exe

    • Size

      1.4MB

    • MD5

      bd064f5b67dcb30de45b19e11d424f53

    • SHA1

      cfe03d52e6af08c9ad2d7c7f3b7afbd4d7e5794d

    • SHA256

      9d603074042f5d594bc2710ed1545ce7648f35ea0ad789ed1ffbfa2d294faf55

    • SHA512

      20a2b6c6bcddaa77f5a5b7dee4d1a6bc14eeae093cdd5b20cdf2567606f3253d48cf60463f6aa380bf43d541733cbb06543fd21ce271821311057e250c886cb8

    • SSDEEP

      24576:+JDy73Le60VNu1ZtGYNitrP7DVvIiK7vog0soXrmiSyqDG2whTfrO:+U7q60VNu1ZtZ4tr7DVGog0sovnq2zO

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks