Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    11-10-2021 08:07

General

  • Target

    0a424c71b75fecfb42fb0e2b17f1c6bc.exe

  • Size

    1.3MB

  • MD5

    0a424c71b75fecfb42fb0e2b17f1c6bc

  • SHA1

    672ef8db0788b4dad4d4fe2853573140448447f6

  • SHA256

    a7cce7b44e791b44a67edeec0489858b4ba9d1a82464d4148a6f691a4e86e93c

  • SHA512

    b744c61ff97d08c2112b1ac752fabd057efe2e5b7a70f2c65ed5e2c83960b763cf444f99e3f5a285578b31a10ee33c016e95e2d2979fd2bc09c69e941a2615dc

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dm-teh.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Vm@(O;CO.vEQ

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a424c71b75fecfb42fb0e2b17f1c6bc.exe
    "C:\Users\Admin\AppData\Local\Temp\0a424c71b75fecfb42fb0e2b17f1c6bc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3596
    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      "C:\Users\Admin\AppData\Local\Temp\\AddInProcess32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1420

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1420-124-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/1420-129-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/1420-128-0x0000000000560000-0x000000000056A000-memory.dmp

    Filesize

    40KB

  • memory/1420-127-0x0000000000560000-0x0000000000566000-memory.dmp

    Filesize

    24KB

  • memory/3596-119-0x0000000005500000-0x0000000005501000-memory.dmp

    Filesize

    4KB

  • memory/3596-123-0x0000000006750000-0x000000000675A000-memory.dmp

    Filesize

    40KB

  • memory/3596-122-0x0000000007EF0000-0x0000000007EF1000-memory.dmp

    Filesize

    4KB

  • memory/3596-121-0x0000000001530000-0x0000000001554000-memory.dmp

    Filesize

    144KB

  • memory/3596-120-0x00000000053C0000-0x00000000058BE000-memory.dmp

    Filesize

    5.0MB

  • memory/3596-115-0x0000000000A40000-0x0000000000A41000-memory.dmp

    Filesize

    4KB

  • memory/3596-118-0x0000000005460000-0x0000000005461000-memory.dmp

    Filesize

    4KB

  • memory/3596-117-0x00000000058C0000-0x00000000058C1000-memory.dmp

    Filesize

    4KB