General

  • Target

    Order-688930021178.exe

  • Size

    1.4MB

  • Sample

    230516-kdj9rsca43

  • MD5

    bd064f5b67dcb30de45b19e11d424f53

  • SHA1

    cfe03d52e6af08c9ad2d7c7f3b7afbd4d7e5794d

  • SHA256

    9d603074042f5d594bc2710ed1545ce7648f35ea0ad789ed1ffbfa2d294faf55

  • SHA512

    20a2b6c6bcddaa77f5a5b7dee4d1a6bc14eeae093cdd5b20cdf2567606f3253d48cf60463f6aa380bf43d541733cbb06543fd21ce271821311057e250c886cb8

  • SSDEEP

    24576:+JDy73Le60VNu1ZtGYNitrP7DVvIiK7vog0soXrmiSyqDG2whTfrO:+U7q60VNu1ZtZ4tr7DVGog0sovnq2zO

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      Order-688930021178.exe

    • Size

      1.4MB

    • MD5

      bd064f5b67dcb30de45b19e11d424f53

    • SHA1

      cfe03d52e6af08c9ad2d7c7f3b7afbd4d7e5794d

    • SHA256

      9d603074042f5d594bc2710ed1545ce7648f35ea0ad789ed1ffbfa2d294faf55

    • SHA512

      20a2b6c6bcddaa77f5a5b7dee4d1a6bc14eeae093cdd5b20cdf2567606f3253d48cf60463f6aa380bf43d541733cbb06543fd21ce271821311057e250c886cb8

    • SSDEEP

      24576:+JDy73Le60VNu1ZtGYNitrP7DVvIiK7vog0soXrmiSyqDG2whTfrO:+U7q60VNu1ZtZ4tr7DVGog0sovnq2zO

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks