General
-
Target
44c401c50cdbecf5f20fffd60e48628f
-
Size
299KB
-
Sample
240105-3115xaebe4
-
MD5
44c401c50cdbecf5f20fffd60e48628f
-
SHA1
6ba74f52e4e774f5762e99d7f49cc787f28353d4
-
SHA256
e6407a39f1b2fb728a40612d6ca8e71d6dc004d9efb569f2f4d351ab693ac6f4
-
SHA512
ae385fe48068210b45075d1b2433bb3606766f2e6fc17d9c14582040f2f2b64f411e1bcd29facc16fa59243987d894c7a084a573db032909e68a8d977d5108f3
-
SSDEEP
6144:LWlg4qQdWyIAvEZ023cZ05Pi+xPwIwWFvAKbmWJI8xF7+Or:LQzAyIAvP7iwWyKb1+GqOr
Static task
static1
Behavioral task
behavioral1
Sample
44c401c50cdbecf5f20fffd60e48628f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
44c401c50cdbecf5f20fffd60e48628f.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.dm-teh.com - Port:
587 - Username:
[email protected] - Password:
Vm@(O;CO.vEQ
Targets
-
-
Target
44c401c50cdbecf5f20fffd60e48628f
-
Size
299KB
-
MD5
44c401c50cdbecf5f20fffd60e48628f
-
SHA1
6ba74f52e4e774f5762e99d7f49cc787f28353d4
-
SHA256
e6407a39f1b2fb728a40612d6ca8e71d6dc004d9efb569f2f4d351ab693ac6f4
-
SHA512
ae385fe48068210b45075d1b2433bb3606766f2e6fc17d9c14582040f2f2b64f411e1bcd29facc16fa59243987d894c7a084a573db032909e68a8d977d5108f3
-
SSDEEP
6144:LWlg4qQdWyIAvEZ023cZ05Pi+xPwIwWFvAKbmWJI8xF7+Or:LQzAyIAvP7iwWyKb1+GqOr
Score10/10-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-