General
-
Target
PI-12042023-02.exe
-
Size
1.4MB
-
Sample
230519-mm8ptsgb5y
-
MD5
00ec65f5667134941484ca7ef40ef167
-
SHA1
e2aa6f59e21c3d69fe09e036a0db32249739874a
-
SHA256
e0e677d03d49bc27c8575e7f2a4816aaf10cea4d624671292cce7e2eeec67497
-
SHA512
d4f09ab5aa9fe5f5ea4429c6dba4e45d3021ffd512148df900bfdcfb3d91c28ce9cf7638f18e857fe913bffac573db70586d6261474813b4baadf4831bf949f9
-
SSDEEP
24576:X4Ze+gp1yI/aLxE5HY9qzZyQ9HHgefs+LbeFgEC/fGKhQ8mI5EKq:7G1E5HGqzMCg3geEXGk+K
Static task
static1
Behavioral task
behavioral1
Sample
PI-12042023-02.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PI-12042023-02.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
PI-12042023-02.exe
-
Size
1.4MB
-
MD5
00ec65f5667134941484ca7ef40ef167
-
SHA1
e2aa6f59e21c3d69fe09e036a0db32249739874a
-
SHA256
e0e677d03d49bc27c8575e7f2a4816aaf10cea4d624671292cce7e2eeec67497
-
SHA512
d4f09ab5aa9fe5f5ea4429c6dba4e45d3021ffd512148df900bfdcfb3d91c28ce9cf7638f18e857fe913bffac573db70586d6261474813b4baadf4831bf949f9
-
SSDEEP
24576:X4Ze+gp1yI/aLxE5HY9qzZyQ9HHgefs+LbeFgEC/fGKhQ8mI5EKq:7G1E5HGqzMCg3geEXGk+K
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-