General

  • Target

    c417498058dcc5982157432ff63d33e9.bin

  • Size

    853KB

  • Sample

    230723-cngydsde9v

  • MD5

    e4ba75282512c1c130e7eac3d88110f9

  • SHA1

    b496a211873834373bab833e42bed730ec6ebf2f

  • SHA256

    0ad01103b440846337acabfd86925205e596de10409b80eeda2d640389ca43be

  • SHA512

    1b266dfc0ee4081face71f42e0a522d801bef5c78353f94b767efc7ee76ae0fbf7491c921bf697e218657afad1b3664a76b011c9f7f88c5c068729f126596d9b

  • SSDEEP

    24576:ciAnwYeYq59KVYh4qg4USEatww0OukZCxAkW:QnJJKKe4ibkUkxrW

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot6120911772:AAEvnEDbWRlbIuD1NP8MtmiY3tQ46T9SQyo/sendMessage?chat_id=6082430866

Targets

    • Target

      87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe

    • Size

      1.2MB

    • MD5

      c417498058dcc5982157432ff63d33e9

    • SHA1

      a9909f37d3cef589e2086a5bb3dfc728596130f6

    • SHA256

      87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06

    • SHA512

      5e06e931c3e142aa0ec69452183a328595acb82009011e6bd702ccd2ed65bcfe075562a845e9f1aefadb74c2b731b3f84b684a116f1cf8bd20fd3b277d807844

    • SSDEEP

      24576:pN6GEf47+UgcarQNkRq/mczfSrio0cXNf:D6hf47+OarDRgLfSF0iN

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks