General
-
Target
9971813b73d9822149d699f592f7d958
-
Size
2.6MB
-
Sample
240213-ps182sba69
-
MD5
9971813b73d9822149d699f592f7d958
-
SHA1
79d1b057a523addc7adc4d305d4df54d35cd923b
-
SHA256
6f166bd961214455803a5d9656fc2a70837df425936a87ed0f88bd58a06b3be9
-
SHA512
6559c25827037f9a6550f2c5582eca563c167fee4c2a63150210c81b3834f249270f15dd7938028e2d21a095ceba8588223394179053c024ff83d6ef07f128cf
-
SSDEEP
24576:5yvaeTFag6WbUonU6ZJOlbWfwnHVPi9QBTZdIauBhHv5ZGMAJ0PHJi:svavh76ByQmlIRPXA
Static task
static1
Behavioral task
behavioral1
Sample
9971813b73d9822149d699f592f7d958.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9971813b73d9822149d699f592f7d958.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot1943133814:AAGel7Cna1V4ds4YJL4kPgVVqKEmYV09C7I/sendMessage?chat_id=1518974695
Targets
-
-
Target
9971813b73d9822149d699f592f7d958
-
Size
2.6MB
-
MD5
9971813b73d9822149d699f592f7d958
-
SHA1
79d1b057a523addc7adc4d305d4df54d35cd923b
-
SHA256
6f166bd961214455803a5d9656fc2a70837df425936a87ed0f88bd58a06b3be9
-
SHA512
6559c25827037f9a6550f2c5582eca563c167fee4c2a63150210c81b3834f249270f15dd7938028e2d21a095ceba8588223394179053c024ff83d6ef07f128cf
-
SSDEEP
24576:5yvaeTFag6WbUonU6ZJOlbWfwnHVPi9QBTZdIauBhHv5ZGMAJ0PHJi:svavh76ByQmlIRPXA
Score10/10-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-