General
-
Target
INQUIRY.exe
-
Size
1.0MB
-
Sample
230607-r6ctqacd6z
-
MD5
008d403f9c3256f249844b772e69df0b
-
SHA1
585052adf379c88d8dda6d702171d555107aee24
-
SHA256
324f9aa85a477ba47d4dc4e8516be8d8600eec6de72b44ee671efae46b5c965e
-
SHA512
296d3f8600c4431751f226dbfe861e30f169c446e4916fc5e7c7fe42ee279b6af88a4f7581220896fc78c711adb88c109c8aa4ba03085afae060fc14716f37b6
-
SSDEEP
24576:aUlRuROyqGUL8N77c72qU+osnvDLhi3NgULc29hh3Y5RpjlAwX:aUlRuRNqGo8NvW2qUyvfQ3NbPodew
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
INQUIRY.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
INQUIRY.exe
-
Size
1.0MB
-
MD5
008d403f9c3256f249844b772e69df0b
-
SHA1
585052adf379c88d8dda6d702171d555107aee24
-
SHA256
324f9aa85a477ba47d4dc4e8516be8d8600eec6de72b44ee671efae46b5c965e
-
SHA512
296d3f8600c4431751f226dbfe861e30f169c446e4916fc5e7c7fe42ee279b6af88a4f7581220896fc78c711adb88c109c8aa4ba03085afae060fc14716f37b6
-
SSDEEP
24576:aUlRuROyqGUL8N77c72qU+osnvDLhi3NgULc29hh3Y5RpjlAwX:aUlRuRNqGo8NvW2qUyvfQ3NbPodew
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-