General
-
Target
2552-163-0x0000000000400000-0x0000000000472000-memory.dmp
-
Size
456KB
-
Sample
240302-pysh4add3v
-
MD5
8f7226104c4d7d8f2370189621507367
-
SHA1
dedb13ae4dec7788290a73162d7e63ef1e5cc7da
-
SHA256
7123566d71d2fd588fa4a408a7ef476b409d0e74929601c636f1fbc5b5854135
-
SHA512
9c819032d82e7c177be018a5eb2de7cd968fbc256577562f6523fdc07a546c35a0f415a4ab09b3266f1a47766ab1fc26a547f9679487eef853f52fd8ec1d6644
-
SSDEEP
12288:TWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmBC:0xgsRftD0C2nKGs
Behavioral task
behavioral1
Sample
2552-163-0x0000000000400000-0x0000000000472000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2552-163-0x0000000000400000-0x0000000000472000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5813496253:AAF4hamIx4-mNmFF1DwsqdJ4F9vUBmFqLo/sendMessage?chat_id=1105271645
Targets
-
-
Target
2552-163-0x0000000000400000-0x0000000000472000-memory.dmp
-
Size
456KB
-
MD5
8f7226104c4d7d8f2370189621507367
-
SHA1
dedb13ae4dec7788290a73162d7e63ef1e5cc7da
-
SHA256
7123566d71d2fd588fa4a408a7ef476b409d0e74929601c636f1fbc5b5854135
-
SHA512
9c819032d82e7c177be018a5eb2de7cd968fbc256577562f6523fdc07a546c35a0f415a4ab09b3266f1a47766ab1fc26a547f9679487eef853f52fd8ec1d6644
-
SSDEEP
12288:TWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmBC:0xgsRftD0C2nKGs
Score6/10-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-