General
-
Target
SecuriteInfo.com.W32.AIDetectNet.01.32418.685
-
Size
784KB
-
Sample
220808-pzmdgaagfj
-
MD5
9125b27ee74d370a228c1a0548583d5c
-
SHA1
64cad7be23c173a8ebd699bbff645140078d859f
-
SHA256
9baa729c84b71d5cc983e62d455f63ee65ba13c09d314f8be595e366a9477669
-
SHA512
1c7829ae38769aec0772fb42372732ccd3bdff05cedc48483f58b320258e7090a173632d0f3b0f32f04c0b66d68f0eed334e0d11e968f7bca10e3c9a85e2de41
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.AIDetectNet.01.32418.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.W32.AIDetectNet.01.32418.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
lotexh.shop - Port:
587 - Username:
[email protected] - Password:
AmWcR;&S@thk
Targets
-
-
Target
SecuriteInfo.com.W32.AIDetectNet.01.32418.685
-
Size
784KB
-
MD5
9125b27ee74d370a228c1a0548583d5c
-
SHA1
64cad7be23c173a8ebd699bbff645140078d859f
-
SHA256
9baa729c84b71d5cc983e62d455f63ee65ba13c09d314f8be595e366a9477669
-
SHA512
1c7829ae38769aec0772fb42372732ccd3bdff05cedc48483f58b320258e7090a173632d0f3b0f32f04c0b66d68f0eed334e0d11e968f7bca10e3c9a85e2de41
Score10/10-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-