General

  • Target

    SecuriteInfo.com.W32.AIDetectNet.01.9123.22120

  • Size

    1.1MB

  • Sample

    220815-ljtwtsbgd4

  • MD5

    e016090750d7ba7f0ea23beee330da11

  • SHA1

    946fce67103c7a16711d9ba61e1b2f62236693b2

  • SHA256

    8615bc30555f0ccd60466d99d1fe9e20fba142a3141ddd13f8354f564c47135a

  • SHA512

    06f2f99e27a09ced989c49b7aa2c94f12d6d8d88467da9c7acadaba03856162d80b89b35d5e3f77410f4d4e4be882e6383221e047a35a1e6bdb48f20b11ab0ee

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.oiliskim.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Ifeanyi@123

Targets

    • Target

      SecuriteInfo.com.W32.AIDetectNet.01.9123.22120

    • Size

      1.1MB

    • MD5

      e016090750d7ba7f0ea23beee330da11

    • SHA1

      946fce67103c7a16711d9ba61e1b2f62236693b2

    • SHA256

      8615bc30555f0ccd60466d99d1fe9e20fba142a3141ddd13f8354f564c47135a

    • SHA512

      06f2f99e27a09ced989c49b7aa2c94f12d6d8d88467da9c7acadaba03856162d80b89b35d5e3f77410f4d4e4be882e6383221e047a35a1e6bdb48f20b11ab0ee

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks