General

  • Target

    1200-140-0x0000000000400000-0x0000000000654000-memory.dmp

  • Size

    2.3MB

  • Sample

    230516-xbmnbsca69

  • MD5

    2a67b3a60052a5c4a7f5a799feb3e95a

  • SHA1

    632f937a310a689f8cc71dad111a6a0074486646

  • SHA256

    d7604717f253c708b811bbc895b9baeb3f9060161bfcfc7791e42855ac3f1927

  • SHA512

    cdc3fbefdce5c55855ca8c1d3a0e08d49430d518ad01812636b84dbd97835ef528422dde80459f14f24113f4c482ae599a6db2a88990aeb291d15d935d80785b

  • SSDEEP

    24576:pxgsRftD0C2nKGH0Djsf9nz4mloFQnpXUMPQDR6q79dA:paSftDnGUDYf5zaCpXxPuR6E9dA

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Targets

    • Target

      1200-140-0x0000000000400000-0x0000000000654000-memory.dmp

    • Size

      2.3MB

    • MD5

      2a67b3a60052a5c4a7f5a799feb3e95a

    • SHA1

      632f937a310a689f8cc71dad111a6a0074486646

    • SHA256

      d7604717f253c708b811bbc895b9baeb3f9060161bfcfc7791e42855ac3f1927

    • SHA512

      cdc3fbefdce5c55855ca8c1d3a0e08d49430d518ad01812636b84dbd97835ef528422dde80459f14f24113f4c482ae599a6db2a88990aeb291d15d935d80785b

    • SSDEEP

      24576:pxgsRftD0C2nKGH0Djsf9nz4mloFQnpXUMPQDR6q79dA:paSftDnGUDYf5zaCpXxPuR6E9dA

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks