General
-
Target
c7b62d2eddca1acf1d394dc03808ecb370c2125ae55786628ad856f55c71b9f8
-
Size
162KB
-
Sample
230814-stjl6seh4w
-
MD5
7a5a25c84745b9eff14d6ede544150b0
-
SHA1
48baf94f77091d63bd22067aa064c966f60bf55c
-
SHA256
c7b62d2eddca1acf1d394dc03808ecb370c2125ae55786628ad856f55c71b9f8
-
SHA512
cb8f866f8c05d0094818c8063be0c11974bfba01f8923718b4687fc0956f0590036f2f120c9c50278426c1e2d8d271a6b027044d1115b3ac3782400657c8864f
-
SSDEEP
1536:kiiHA0C/fLKpoTNxrNnubIq59PdTvdl5PAaZ/Sv93Q28FHDdD:5iiLKpS/Ni59P1tfhAP8tDd
Static task
static1
Behavioral task
behavioral1
Sample
Product Spec.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Product Spec.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5518827253:AAGOg42FA-LTJl6MOuvPuukxFyV4dUBJ5rM/sendMessage?chat_id=1223462240
Targets
-
-
Target
Product Spec.exe
-
Size
112KB
-
MD5
d59c27e2eb8d505a78b0d57801750df5
-
SHA1
947335b0768c0e6c63d6b3185785ebbe71538511
-
SHA256
d8dc20517ab9336ee7bbfee1416a5c6ec0cb2cf63400c803858c7c1db4f4f837
-
SHA512
b3a568be8db5d6edf098a7157cb53782e84efcc81ed8ba5cf0f5ee60e51dccc0343bff580c2c066c95a61ba2c1656819b4b52b3974de44e4531518b972ab3842
-
SSDEEP
1536:AiiHA0C/fLKpoTNxrNnubIq59PdTvdl5PAaZ/Sv93Q28FHDd:NiiLKpS/Ni59P1tfhAP8tDd
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-