General
-
Target
7a21e7cd0bb339b2d5533a3114ebc920
-
Size
619KB
-
Sample
240127-npwcysbce9
-
MD5
7a21e7cd0bb339b2d5533a3114ebc920
-
SHA1
46eb9f47d337920d5848e60fdebe67ef33fd884a
-
SHA256
31ff4a9756eab5f110bd19f1250d50cca5068054e99e73068929113aaccad0bd
-
SHA512
ef66aac8fb210fad10ff3657c27f8908b4d4cd917103bce1196a309cc6ebb33b191a81ead4201e627483b729d9768b26fd4969d0c99ef7303bfabfb9cfa45331
-
SSDEEP
12288:9O1ovBJLNs6kBN0nm/6cXrV81GlE0ENQ1wJDroYSO14VFA9Mt:UGvWbN0/KOkE0mQ1wJfoFXAyt
Static task
static1
Behavioral task
behavioral1
Sample
Btc payments copy_3000 usd_________________.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Btc payments copy_3000 usd_________________.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.sabaint.me - Port:
587 - Username:
[email protected] - Password:
regina1983-
Targets
-
-
Target
Btc payments copy_3000 usd_________________.exe
-
Size
915KB
-
MD5
fa78d1d0ef30fafdb9670abc29deb24e
-
SHA1
52b8bf6a36b6f4f74718c51c356112368110807f
-
SHA256
80877119f9ddd3a9f4740e0b04640d3fd1793787cfb9d45cc5f23ed318828b1b
-
SHA512
f9c96a1f2054ed926b39938594d8051ebe926044a15a3650b6fb9e9766ea50df6bcae4834381378c6959dc4489f86097863c44c5e6cdc0e28be0660e1794b1da
-
SSDEEP
12288:1FDc9F3nC0Py3gAhgqeJbNo6CBN0bm1acX3x81GzE0ELQ1wBDrUYSi142+y:15bN0RKWgE0mQ1wBfUFy+y
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-