General
-
Target
4.exe
-
Size
1.9MB
-
Sample
220815-mbd13scbg3
-
MD5
adf6fb25451bedd42bf008aab3526a78
-
SHA1
f19c7c77ddbe01491f8deb0c1f241f7ef19341bf
-
SHA256
e95133b41a680c6eefc46c572c77c90ec1597046bfd5a7d6d6199ed566b43457
-
SHA512
12327658ca54ea5bfdc320b7136a6866620cdb3b13a057f2cd69120ae3383c18635ab57a4838ed0fb288fbd90ad9e838f984907fe8c4b12a22ac7537400f98d8
Static task
static1
Behavioral task
behavioral1
Sample
4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
lotexh.shop - Port:
587 - Username:
[email protected] - Password:
AmWcR;&S@thk
Targets
-
-
Target
4.exe
-
Size
1.9MB
-
MD5
adf6fb25451bedd42bf008aab3526a78
-
SHA1
f19c7c77ddbe01491f8deb0c1f241f7ef19341bf
-
SHA256
e95133b41a680c6eefc46c572c77c90ec1597046bfd5a7d6d6199ed566b43457
-
SHA512
12327658ca54ea5bfdc320b7136a6866620cdb3b13a057f2cd69120ae3383c18635ab57a4838ed0fb288fbd90ad9e838f984907fe8c4b12a22ac7537400f98d8
Score10/10-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-