General

  • Target

    SecuriteInfo.com.W32.AIDetectNet.01.32418.685

  • Size

    784KB

  • Sample

    220808-pzmdgaagfj

  • MD5

    9125b27ee74d370a228c1a0548583d5c

  • SHA1

    64cad7be23c173a8ebd699bbff645140078d859f

  • SHA256

    9baa729c84b71d5cc983e62d455f63ee65ba13c09d314f8be595e366a9477669

  • SHA512

    1c7829ae38769aec0772fb42372732ccd3bdff05cedc48483f58b320258e7090a173632d0f3b0f32f04c0b66d68f0eed334e0d11e968f7bca10e3c9a85e2de41

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    lotexh.shop
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    AmWcR;&S@thk

Targets

    • Target

      SecuriteInfo.com.W32.AIDetectNet.01.32418.685

    • Size

      784KB

    • MD5

      9125b27ee74d370a228c1a0548583d5c

    • SHA1

      64cad7be23c173a8ebd699bbff645140078d859f

    • SHA256

      9baa729c84b71d5cc983e62d455f63ee65ba13c09d314f8be595e366a9477669

    • SHA512

      1c7829ae38769aec0772fb42372732ccd3bdff05cedc48483f58b320258e7090a173632d0f3b0f32f04c0b66d68f0eed334e0d11e968f7bca10e3c9a85e2de41

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks