Analysis
-
max time kernel
123s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
12-10-2021 12:17
Static task
static1
Behavioral task
behavioral1
Sample
T98765434567898.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
T98765434567898.exe
Resource
win10v20210408
General
-
Target
T98765434567898.exe
-
Size
1.2MB
-
MD5
abb26d1600dda55b1004b39d569178a8
-
SHA1
8e6cba40d4ddd9d6ff6b781f79febbb47e58855b
-
SHA256
1d0e997a1e0cca7446644a5082da18ea191862c85a3e222b0296bdb158c2a387
-
SHA512
8d560a240bba2f915ff5a7b05bd061cbc68c8ce2268ee8b6815834f00452232e4f63da89e8d9b565dec45f0e9df232931676caae8ac6242995d14ad1222eb3e4
Malware Config
Extracted
blustealer
https://api.telegram.org/bot1838876767:AAEiDKTcT_A4WBwpMo9nnrtBP7OvsmEUnNU/sendMessage?chat_id=1300181783
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Loads dropped DLL 1 IoCs
pid Process 1268 T98765434567898.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1268 set thread context of 672 1268 T98765434567898.exe 27 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 672 T98765434567898.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1268 wrote to memory of 672 1268 T98765434567898.exe 27 PID 1268 wrote to memory of 672 1268 T98765434567898.exe 27 PID 1268 wrote to memory of 672 1268 T98765434567898.exe 27 PID 1268 wrote to memory of 672 1268 T98765434567898.exe 27 PID 1268 wrote to memory of 672 1268 T98765434567898.exe 27 PID 1268 wrote to memory of 672 1268 T98765434567898.exe 27 PID 1268 wrote to memory of 672 1268 T98765434567898.exe 27 PID 1268 wrote to memory of 672 1268 T98765434567898.exe 27 PID 1268 wrote to memory of 672 1268 T98765434567898.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\T98765434567898.exe"C:\Users\Admin\AppData\Local\Temp\T98765434567898.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\T98765434567898.exe"C:\Users\Admin\AppData\Local\Temp\T98765434567898.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:672
-