General

  • Target

    SecuriteInfo.com.Trojan.DownloaderNET.345.23320.6061

  • Size

    724KB

  • Sample

    220808-t4s42adcaj

  • MD5

    0f150fb1582b1a8917a0c70c8be24586

  • SHA1

    4f11085573f5bb60cfbdd3acaa83930bb77f1ee0

  • SHA256

    1eacc69459d960cc11c10fcdd8e4dcdf96d5c413fa741eb61d8dc465af018fea

  • SHA512

    a7f40fdaf59d30c332ea2f8321e45aeabdb2490901b4cdd54c31c6055ef330d6ad63312e91b15bf27e7f9df3ac356b09136b233c332ec4de3b3cd66f477167f8

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.kilisosb.org.tr
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    yunus.1995

Targets

    • Target

      SecuriteInfo.com.Trojan.DownloaderNET.345.23320.6061

    • Size

      724KB

    • MD5

      0f150fb1582b1a8917a0c70c8be24586

    • SHA1

      4f11085573f5bb60cfbdd3acaa83930bb77f1ee0

    • SHA256

      1eacc69459d960cc11c10fcdd8e4dcdf96d5c413fa741eb61d8dc465af018fea

    • SHA512

      a7f40fdaf59d30c332ea2f8321e45aeabdb2490901b4cdd54c31c6055ef330d6ad63312e91b15bf27e7f9df3ac356b09136b233c332ec4de3b3cd66f477167f8

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks