Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2023 14:59

General

  • Target

    520-62-0x0000000000400000-0x0000000000654000-memory.exe

  • Size

    2.3MB

  • MD5

    66e48c2e6b5977eacee48e7dc0e86a02

  • SHA1

    d0f8e3a846a4d6615aef1eeb2fa66d69212c8dc1

  • SHA256

    63e6ce42b31c1f038569d0fe48abc3b315072b99391d5df382ce4f8977174cb2

  • SHA512

    6288eab124b3a9b622db9b28cae4822d7dac4d1a2783385a375afa4860564f8ca55cbf459447d8f58f89d25c6bffc0234609bb73c3169147d07a9b9162af8901

  • SSDEEP

    12288:CWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:pxgsRftD0C2nKG

Score
10/10

Malware Config

Extracted

Family

blustealer

C2

https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Program crash 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\520-62-0x0000000000400000-0x0000000000654000-memory.exe
    "C:\Users\Admin\AppData\Local\Temp\520-62-0x0000000000400000-0x0000000000654000-memory.exe"
    1⤵
      PID:824
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 412
        2⤵
        • Program crash
        PID:1636
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 824 -ip 824
      1⤵
        PID:912

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/824-133-0x0000000000400000-0x0000000000654000-memory.dmp

        Filesize

        2.3MB