General
-
Target
d3218551c9be855f8bff76c38536a454
-
Size
2.6MB
-
Sample
240318-k5xzyadb53
-
MD5
d3218551c9be855f8bff76c38536a454
-
SHA1
a43a9bfb82106644719211b93512d3adbbd00e6c
-
SHA256
d5e262331262d0925aaa1e5c601e41f82a6795275067e44e7bef7624db0f0b48
-
SHA512
c471a9ae459eda97dce8b40dca6022b61ca124a89d7ec18d85c36a14c4c13fd1cd18a39c5f9782c0e4b4d0ee3f91884f25987347a358166ccd9d544ea3748de5
-
SSDEEP
24576:O3t/5Fixhtf5HxoPpGQrH0yUxnNnmtA7tuWxGFYCOAzlUsUtsmr7O:KFQ2+Xn2PoGFm77
Static task
static1
Behavioral task
behavioral1
Sample
d3218551c9be855f8bff76c38536a454.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d3218551c9be855f8bff76c38536a454.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
blustealer
https://api.telegram.org/bot1949235546:AAFJ8hWHynuHinrzOjcAE-TQlS6bYGcf8J8/sendMessage?chat_id=1947722068
Targets
-
-
Target
d3218551c9be855f8bff76c38536a454
-
Size
2.6MB
-
MD5
d3218551c9be855f8bff76c38536a454
-
SHA1
a43a9bfb82106644719211b93512d3adbbd00e6c
-
SHA256
d5e262331262d0925aaa1e5c601e41f82a6795275067e44e7bef7624db0f0b48
-
SHA512
c471a9ae459eda97dce8b40dca6022b61ca124a89d7ec18d85c36a14c4c13fd1cd18a39c5f9782c0e4b4d0ee3f91884f25987347a358166ccd9d544ea3748de5
-
SSDEEP
24576:O3t/5Fixhtf5HxoPpGQrH0yUxnNnmtA7tuWxGFYCOAzlUsUtsmr7O:KFQ2+Xn2PoGFm77
Score10/10-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-