General

  • Target

    e9ae8d2f81cc2981ae784f3648040a92_JaffaCakes118

  • Size

    720KB

  • Sample

    240409-lfmcksbf85

  • MD5

    e9ae8d2f81cc2981ae784f3648040a92

  • SHA1

    d9a19d08b817a88feaf08e00eee8a0479663a960

  • SHA256

    1d03149eb8839cefbe072e5fed04a5a775f856b53ffa1373f235a6a5ddceb553

  • SHA512

    f3ec9ededf32237cc22f5e303e00ee422b8e0d16c2ba789224808d069364ea9cbaf51d969e32e2b87086a1566c1528ef3f3d7cbfa494cbdd1d08ecac412fa1eb

  • SSDEEP

    12288:uQWRct2NjFmzP1Wy4ASG3smyH0/X6BDWaozKnaoEe0N:u7RcMNjgWy4ASG3K4KtvcRoE

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot1802269231:AAELtF2SraPZQTuiNsCQFsNfPKlpc9jYjSk/sendMessage?chat_id=1817981127

Targets

    • Target

      e9ae8d2f81cc2981ae784f3648040a92_JaffaCakes118

    • Size

      720KB

    • MD5

      e9ae8d2f81cc2981ae784f3648040a92

    • SHA1

      d9a19d08b817a88feaf08e00eee8a0479663a960

    • SHA256

      1d03149eb8839cefbe072e5fed04a5a775f856b53ffa1373f235a6a5ddceb553

    • SHA512

      f3ec9ededf32237cc22f5e303e00ee422b8e0d16c2ba789224808d069364ea9cbaf51d969e32e2b87086a1566c1528ef3f3d7cbfa494cbdd1d08ecac412fa1eb

    • SSDEEP

      12288:uQWRct2NjFmzP1Wy4ASG3smyH0/X6BDWaozKnaoEe0N:u7RcMNjgWy4ASG3K4KtvcRoE

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks