General

  • Target

    Request for Quotation.gz

  • Size

    1.3MB

  • Sample

    230515-vmz2page78

  • MD5

    dc06332b47519e981cee404fdf633560

  • SHA1

    1445c83d698d08b1ceb90967acdaa97efe000522

  • SHA256

    551af39d6b0f2a184a1130213726b032fb7e0cb40f622cd9a64cbfc32ffad521

  • SHA512

    978572b6058992040d62c9bd5c27d8f3e5cd07390878158fad9e1bd45e07e57d36f10dd538f25a144aa0856ab0821bcc6503143368a6f6731e2f5d52861e1760

  • SSDEEP

    24576:Z2swCQ5p3EUHpkSMwNvtwgN9uICMdouCOG9eUoyKTu6SJY2:4+Q5HJPj9CM/09A3SV

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      Request for Quotation.exe

    • Size

      1.5MB

    • MD5

      67683d83541b578498d12ddc5828260e

    • SHA1

      679904b6c6101f399811885b42e98c4c8c564e6e

    • SHA256

      9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680

    • SHA512

      fb3080919598e0bedaa3b429e86f498bbbfcfb257a9c92dc9f6c197e2da9bd17328cc762bd97e7cbb770f0d6f1e8c8c05107a59f6204ce8ebc5ad4996e8e709b

    • SSDEEP

      24576:sLOOmjfJ7uGyhgAzbOQ31ubRVTkK09CDg2bCaUwFDyfCTdNuuVIF/gwqb+:sG17uGmPOQ3oNVTkhC/bCaUwpy2wuV32

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks