General
-
Target
dc06332b47519e981cee404fdf633560.bin
-
Size
1.3MB
-
Sample
230517-b8tx1sdd48
-
MD5
c56fce091517a636fa5ecaf70e59d4e5
-
SHA1
59f761e65e2398d23b21a3d8bd5a04493b5bbcc5
-
SHA256
20ee2801106d4ff80f2b5147544e837a941240cc5b54d4fe026bc16c07c1e516
-
SHA512
840e66a8cbaf280dff0b2a6eedadf13e99fe14c68991469ad9cd4c7d148ee87175b6c82f4ad42a94851fa6bdfc19a142c2e27809544c697a2da095e1ccc62a3b
-
SSDEEP
24576:+nOj68g2RKaBUa1IKQaek4KSZIhNHmjHECcx72ThBoM0V4WYlIXPYP8LXmEcdy0:L68LRLBUmIk7H+kGoM0V4IPYkTmE4
Static task
static1
Behavioral task
behavioral1
Sample
Request for Quotation.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Request for Quotation.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
Request for Quotation.exe
-
Size
1.5MB
-
MD5
67683d83541b578498d12ddc5828260e
-
SHA1
679904b6c6101f399811885b42e98c4c8c564e6e
-
SHA256
9a3e3d21954d44054b67a726ecc1c6e54a231f4accc013fa91d0830ccf134680
-
SHA512
fb3080919598e0bedaa3b429e86f498bbbfcfb257a9c92dc9f6c197e2da9bd17328cc762bd97e7cbb770f0d6f1e8c8c05107a59f6204ce8ebc5ad4996e8e709b
-
SSDEEP
24576:sLOOmjfJ7uGyhgAzbOQ31ubRVTkK09CDg2bCaUwFDyfCTdNuuVIF/gwqb+:sG17uGmPOQ3oNVTkhC/bCaUwpy2wuV32
Score10/10-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-