General

  • Target

    70fc011e55904f455a12e19e82e3a25fa05a37993bb79f023a5655aabae4b057

  • Size

    1.3MB

  • Sample

    220913-tqh2xagad2

  • MD5

    20cf6b947841f6ed3546f82ed68c1b7f

  • SHA1

    d65463fd21602d678f23678565d1169b3a4a8333

  • SHA256

    70fc011e55904f455a12e19e82e3a25fa05a37993bb79f023a5655aabae4b057

  • SHA512

    e225529b0e191aa3e5ef6ecc362f6f44b3e81d084a6f0fc2240613af9d15f11fb4ca6291ae3b2815ca6c791a9fd25c5ab0bea835441db92bfe65c223eac6cec5

  • SSDEEP

    24576:USeAC7aqFZpthlSTLp6tRgF/3QTJq8vOGxgiNdaeEntTI2IOw:MARqFHthlQp6DIfQfvr5Nct

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.jdaroil.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    JDAR-iraq#@

Targets

    • Target

      70fc011e55904f455a12e19e82e3a25fa05a37993bb79f023a5655aabae4b057

    • Size

      1.3MB

    • MD5

      20cf6b947841f6ed3546f82ed68c1b7f

    • SHA1

      d65463fd21602d678f23678565d1169b3a4a8333

    • SHA256

      70fc011e55904f455a12e19e82e3a25fa05a37993bb79f023a5655aabae4b057

    • SHA512

      e225529b0e191aa3e5ef6ecc362f6f44b3e81d084a6f0fc2240613af9d15f11fb4ca6291ae3b2815ca6c791a9fd25c5ab0bea835441db92bfe65c223eac6cec5

    • SSDEEP

      24576:USeAC7aqFZpthlSTLp6tRgF/3QTJq8vOGxgiNdaeEntTI2IOw:MARqFHthlQp6DIfQfvr5Nct

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks