Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17-08-2022 08:14
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT USD50000.exe
Resource
win7-20220812-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
SWIFT USD50000.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
SWIFT USD50000.exe
-
Size
1.1MB
-
MD5
e016090750d7ba7f0ea23beee330da11
-
SHA1
946fce67103c7a16711d9ba61e1b2f62236693b2
-
SHA256
8615bc30555f0ccd60466d99d1fe9e20fba142a3141ddd13f8354f564c47135a
-
SHA512
06f2f99e27a09ced989c49b7aa2c94f12d6d8d88467da9c7acadaba03856162d80b89b35d5e3f77410f4d4e4be882e6383221e047a35a1e6bdb48f20b11ab0ee
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
mail.oiliskim.com - Port:
587 - Username:
[email protected] - Password:
Ifeanyi@123
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1660 set thread context of 1128 1660 SWIFT USD50000.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1128 SWIFT USD50000.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1128 1660 SWIFT USD50000.exe 28 PID 1660 wrote to memory of 1128 1660 SWIFT USD50000.exe 28 PID 1660 wrote to memory of 1128 1660 SWIFT USD50000.exe 28 PID 1660 wrote to memory of 1128 1660 SWIFT USD50000.exe 28 PID 1660 wrote to memory of 1128 1660 SWIFT USD50000.exe 28 PID 1660 wrote to memory of 1128 1660 SWIFT USD50000.exe 28 PID 1660 wrote to memory of 1128 1660 SWIFT USD50000.exe 28 PID 1660 wrote to memory of 1128 1660 SWIFT USD50000.exe 28 PID 1660 wrote to memory of 1128 1660 SWIFT USD50000.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\SWIFT USD50000.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT USD50000.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\SWIFT USD50000.exe"{path}"2⤵
- Suspicious use of SetWindowsHookEx
PID:1128
-