General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.37666747.25006.734.exe

  • Size

    1.4MB

  • Sample

    230716-cx69mscd28

  • MD5

    ed164e11ea8f141236b6196dac5bd879

  • SHA1

    d06277b3d82a10ffeced147870a1c7cc65947ae0

  • SHA256

    70fa0912521fe919667f8ba2ab28d1e0239b48d860fe7ce0ac7637b4b7282c45

  • SHA512

    996973f75d75a179091211a3d86f91138565add95f7d34089d9610fcfc4ba228c91d1fc830f2f49146db4752270c51702caaf4513fe6cd15df5f5a84427bdd55

  • SSDEEP

    24576:7fdsbW0F+Rhk0JgdIpsiwO/QGoWP2qQF+2:O6k0i2qAQGoie

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.aakarveneers.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    milin@1982

Targets

    • Target

      SecuriteInfo.com.Trojan.GenericKD.37666747.25006.734.exe

    • Size

      1.4MB

    • MD5

      ed164e11ea8f141236b6196dac5bd879

    • SHA1

      d06277b3d82a10ffeced147870a1c7cc65947ae0

    • SHA256

      70fa0912521fe919667f8ba2ab28d1e0239b48d860fe7ce0ac7637b4b7282c45

    • SHA512

      996973f75d75a179091211a3d86f91138565add95f7d34089d9610fcfc4ba228c91d1fc830f2f49146db4752270c51702caaf4513fe6cd15df5f5a84427bdd55

    • SSDEEP

      24576:7fdsbW0F+Rhk0JgdIpsiwO/QGoWP2qQF+2:O6k0i2qAQGoie

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks