General
-
Target
Order-688930021178.exe
-
Size
1.4MB
-
Sample
230517-k3a3dsed74
-
MD5
539273fcc95bb7f4c80a9f2f606d74ec
-
SHA1
48e3f1b32bd1ea099bdfea58e00c25202a99633c
-
SHA256
12e44eb4bc1b8ddd19bb13f6794cfed8721e58ac3065d04c2ccb6a8a3ed30f49
-
SHA512
0994942133fc9dbbe7cbe2f21fe5dfc427508e3985ca8537b2b25104073e38040d7e632e4df0a7d285ef61893a3846123fa60179104d64dbd4cf22968ca99a6f
-
SSDEEP
24576:UhtPtftOfNmMvnYJJeT9zZm2ifn9fvt6quQyFyyHC2bP6nD:EtPVtymM/eeTFZm28xtxZabP6nD
Static task
static1
Behavioral task
behavioral1
Sample
Order-688930021178.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Order-688930021178.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
Order-688930021178.exe
-
Size
1.4MB
-
MD5
539273fcc95bb7f4c80a9f2f606d74ec
-
SHA1
48e3f1b32bd1ea099bdfea58e00c25202a99633c
-
SHA256
12e44eb4bc1b8ddd19bb13f6794cfed8721e58ac3065d04c2ccb6a8a3ed30f49
-
SHA512
0994942133fc9dbbe7cbe2f21fe5dfc427508e3985ca8537b2b25104073e38040d7e632e4df0a7d285ef61893a3846123fa60179104d64dbd4cf22968ca99a6f
-
SSDEEP
24576:UhtPtftOfNmMvnYJJeT9zZm2ifn9fvt6quQyFyyHC2bP6nD:EtPVtymM/eeTFZm28xtxZabP6nD
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-