Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2023 12:44
Static task
static1
Behavioral task
behavioral1
Sample
4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe
Resource
win10v2004-20230220-en
General
-
Target
4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe
-
Size
646KB
-
MD5
6776447387587d3546350f090ff756f4
-
SHA1
67a41fc5c4bf832d5ebe569943c1e70104342992
-
SHA256
4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda
-
SHA512
753e9b8b6fa07c4debbe96c3f2897831622bd8845ef68b7bb92ed7c33f104895f31de2fe5a01da2a0f108c4047291163b427928b2a989bc54fdf7d06b2f5c3d9
-
SSDEEP
12288:0JJqYzhltD7BybICsQmOk+DH1TbpVbC5cPhle2cEbuo9fif+:0JJZhbpPBQVVWyeEH9qm
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.fidvision.icu - Port:
587 - Username:
[email protected] - Password:
Admin@123
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4676 set thread context of 1840 4676 4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe 82 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4676 4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1840 4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4676 wrote to memory of 1840 4676 4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe 82 PID 4676 wrote to memory of 1840 4676 4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe 82 PID 4676 wrote to memory of 1840 4676 4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe 82 PID 4676 wrote to memory of 1840 4676 4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe"C:\Users\Admin\AppData\Local\Temp\4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe"C:\Users\Admin\AppData\Local\Temp\4b9b4b9c7b90ff35a4842f1cd52b4ccd644a71775906560d0d280e71ced15fda.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1840
-