General
-
Target
4.exe
-
Size
1.4MB
-
Sample
230516-rsxxqsbc22
-
MD5
1dab5e05ac3651db47b6f881dab8dd3e
-
SHA1
66c37ab30dc83b3519815b2406cc6dd332e4d91b
-
SHA256
b445018afa2dee3bda17e65e52a7a3c143b0ae31abd00d26f58a4fa3319dd523
-
SHA512
dd31a50b54385b3c1917e6eb17e7970c2fd97ec481c297865d7f37c7f2ea137ed8b60a131e7de5a7eee2278f5d26951c9da0be4e2babb00582993fb1cf8b4472
-
SSDEEP
24576:t9j0kMtM5Gcc59B40fuI3At9NzS1f8iGiEKjOWVQbHnERMJaICUQqi+4P8mHMC9i:7MOqu0fpAt9NzAEi7XxsERNB5PRsYo
Static task
static1
Behavioral task
behavioral1
Sample
4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
4.exe
-
Size
1.4MB
-
MD5
1dab5e05ac3651db47b6f881dab8dd3e
-
SHA1
66c37ab30dc83b3519815b2406cc6dd332e4d91b
-
SHA256
b445018afa2dee3bda17e65e52a7a3c143b0ae31abd00d26f58a4fa3319dd523
-
SHA512
dd31a50b54385b3c1917e6eb17e7970c2fd97ec481c297865d7f37c7f2ea137ed8b60a131e7de5a7eee2278f5d26951c9da0be4e2babb00582993fb1cf8b4472
-
SSDEEP
24576:t9j0kMtM5Gcc59B40fuI3At9NzS1f8iGiEKjOWVQbHnERMJaICUQqi+4P8mHMC9i:7MOqu0fpAt9NzAEi7XxsERNB5PRsYo
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-