General

  • Target

    1496-63-0x0000000000400000-0x0000000000654000-memory.dmp

  • Size

    2.3MB

  • MD5

    1faabaa99cb79de147e601c8f8a67c1e

  • SHA1

    390f7270163e6a9ae26e7488606b42f00bf45af5

  • SHA256

    8d34a012165298f1e02dda3d83b863b3468b4ab5c7edda0f88765ccb3460a629

  • SHA512

    3db77ee481efab33c40c14d2039c58ab772ac152a8c6e72950c84a620f052e96808e80461fb47051945b3f6ffa4888263a743004405fc80dfdc76586f50613bf

  • SSDEEP

    12288:hWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:+xgsRftD0C2nKG

Score
10/10

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • Blustealer family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1496-63-0x0000000000400000-0x0000000000654000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    df8fbcbe90e1e305a660f0ac2aa4fae4


    Headers

    Imports

    Sections