General
-
Target
b02a63fa9c807c8509341d264e494f99
-
Size
1.1MB
-
Sample
240301-dlekxsbf22
-
MD5
b02a63fa9c807c8509341d264e494f99
-
SHA1
dd9a5cfc7dbe769be5a9edb8f1e6e1a5e17bf8ec
-
SHA256
967f7296fc850d9a5c810776f910b5ac22dbff3a31f00c7641bdb68b421b7caf
-
SHA512
e46f85a067aefb3e500e448aec1d878e8cb79f009f3d434e3f25240fc3d50d41ded7abb18845eedcaa03e00f58078a36a4c258ec8bcfdc9fd8f7668dbe3c6b22
-
SSDEEP
24576:Z/FAjZ1EVMqHj1q0oc163Dwlrp9KyxsuM:YZ1EBHBqakDwlrbKCs
Static task
static1
Behavioral task
behavioral1
Sample
b02a63fa9c807c8509341d264e494f99.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b02a63fa9c807c8509341d264e494f99.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.sabaint.me - Port:
587 - Username:
[email protected] - Password:
regina1983-
Targets
-
-
Target
b02a63fa9c807c8509341d264e494f99
-
Size
1.1MB
-
MD5
b02a63fa9c807c8509341d264e494f99
-
SHA1
dd9a5cfc7dbe769be5a9edb8f1e6e1a5e17bf8ec
-
SHA256
967f7296fc850d9a5c810776f910b5ac22dbff3a31f00c7641bdb68b421b7caf
-
SHA512
e46f85a067aefb3e500e448aec1d878e8cb79f009f3d434e3f25240fc3d50d41ded7abb18845eedcaa03e00f58078a36a4c258ec8bcfdc9fd8f7668dbe3c6b22
-
SSDEEP
24576:Z/FAjZ1EVMqHj1q0oc163Dwlrp9KyxsuM:YZ1EBHBqakDwlrbKCs
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-