General
-
Target
3040-140-0x0000000000400000-0x0000000000654000-memory.dmp
-
Size
2.3MB
-
Sample
240305-x4wfyaeh8w
-
MD5
f02928ac338e079f9392afded9cf036b
-
SHA1
6044a58728a468376fe00802bc5617bc1cf1f6b1
-
SHA256
7bd15f22d0da7a1c042f50925778bcb0e8e90397ca578cb1cd2d2cff07c28b97
-
SHA512
b24aa1acfa14f89ef6945946eec192d34a7fe9ce352f6007bafcfde0860b46403799538a1e4853463afe618bbd40f601ed133fb4bb48aa357a162f302cb9df05
-
SSDEEP
24576:IxgsRftD0C2nKG80Djsf9nz4mloFQnpXUMPQDR6q79dA:IaSftDnGfDYf5zaCpXxPuR6E9dA
Behavioral task
behavioral1
Sample
3040-140-0x0000000000400000-0x0000000000654000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3040-140-0x0000000000400000-0x0000000000654000-memory.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Targets
-
-
Target
3040-140-0x0000000000400000-0x0000000000654000-memory.dmp
-
Size
2.3MB
-
MD5
f02928ac338e079f9392afded9cf036b
-
SHA1
6044a58728a468376fe00802bc5617bc1cf1f6b1
-
SHA256
7bd15f22d0da7a1c042f50925778bcb0e8e90397ca578cb1cd2d2cff07c28b97
-
SHA512
b24aa1acfa14f89ef6945946eec192d34a7fe9ce352f6007bafcfde0860b46403799538a1e4853463afe618bbd40f601ed133fb4bb48aa357a162f302cb9df05
-
SSDEEP
24576:IxgsRftD0C2nKG80Djsf9nz4mloFQnpXUMPQDR6q79dA:IaSftDnGfDYf5zaCpXxPuR6E9dA
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-