General

  • Target

    doc3723636638837373344.exe

  • Size

    546KB

  • Sample

    211104-lml1dsgbg2

  • MD5

    bb0f727180c9b29e51c9ab2a9b4c539c

  • SHA1

    ccd4d7a83603d2471aabb0caf2e1196b9193b586

  • SHA256

    2b6b5926ec7e5d6acea355bbd8f43a89850ed85e0c3739edfad2608ead9f1573

  • SHA512

    ce0670de14582f900b89149cb63fdfe171d188a1a7752d72ed068e57775c54557817acd09148d93725bd52456ed901de8e6b6d0fec0d064b24b46fa8dab7e5d5

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.yekamuhendislik.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MuhasebE123*

Targets

    • Target

      doc3723636638837373344.exe

    • Size

      546KB

    • MD5

      bb0f727180c9b29e51c9ab2a9b4c539c

    • SHA1

      ccd4d7a83603d2471aabb0caf2e1196b9193b586

    • SHA256

      2b6b5926ec7e5d6acea355bbd8f43a89850ed85e0c3739edfad2608ead9f1573

    • SHA512

      ce0670de14582f900b89149cb63fdfe171d188a1a7752d72ed068e57775c54557817acd09148d93725bd52456ed901de8e6b6d0fec0d064b24b46fa8dab7e5d5

    • A310logger

      A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • A310logger Executable

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks