General

  • Target

    87.exe

  • Size

    1.2MB

  • Sample

    230721-nq5m1sfa5v

  • MD5

    c417498058dcc5982157432ff63d33e9

  • SHA1

    a9909f37d3cef589e2086a5bb3dfc728596130f6

  • SHA256

    87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06

  • SHA512

    5e06e931c3e142aa0ec69452183a328595acb82009011e6bd702ccd2ed65bcfe075562a845e9f1aefadb74c2b731b3f84b684a116f1cf8bd20fd3b277d807844

  • SSDEEP

    24576:pN6GEf47+UgcarQNkRq/mczfSrio0cXNf:D6hf47+OarDRgLfSF0iN

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot6120911772:AAEvnEDbWRlbIuD1NP8MtmiY3tQ46T9SQyo/sendMessage?chat_id=6082430866

Targets

    • Target

      87.exe

    • Size

      1.2MB

    • MD5

      c417498058dcc5982157432ff63d33e9

    • SHA1

      a9909f37d3cef589e2086a5bb3dfc728596130f6

    • SHA256

      87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06

    • SHA512

      5e06e931c3e142aa0ec69452183a328595acb82009011e6bd702ccd2ed65bcfe075562a845e9f1aefadb74c2b731b3f84b684a116f1cf8bd20fd3b277d807844

    • SSDEEP

      24576:pN6GEf47+UgcarQNkRq/mczfSrio0cXNf:D6hf47+OarDRgLfSF0iN

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks