Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21-12-2023 21:46
Static task
static1
Behavioral task
behavioral1
Sample
0464c8fb6d0d275b197e6424afdcfe85.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0464c8fb6d0d275b197e6424afdcfe85.exe
Resource
win10v2004-20231215-en
General
-
Target
0464c8fb6d0d275b197e6424afdcfe85.exe
-
Size
921KB
-
MD5
0464c8fb6d0d275b197e6424afdcfe85
-
SHA1
1ee7b29c21aadc96befa2f624ef92d43f0c3cd36
-
SHA256
aee13239725c7dcc72761f58f97145f2972aaaf9dc9e91bf0dd5497cb063b21c
-
SHA512
62cdb4e05549629036f4f2c512e145f25cc8b82aa554ce038ac5134e6451bc96fda228ca087ad9b20f98fda394d743eceaa6d0030c6325f47b7052db778d192e
-
SSDEEP
12288:apivtpJkLZHCv06s5bg8OsvepzZFc9MZZw7cdRJfOB66vKkPJTQK6YhyB6A9mhne:LMH6sRbO0epzsiccdqB66vbTk
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.starkgulf.com - Port:
587 - Username:
[email protected] - Password:
info123#
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2936 set thread context of 2628 2936 0464c8fb6d0d275b197e6424afdcfe85.exe 30 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2628 0464c8fb6d0d275b197e6424afdcfe85.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2628 2936 0464c8fb6d0d275b197e6424afdcfe85.exe 30 PID 2936 wrote to memory of 2628 2936 0464c8fb6d0d275b197e6424afdcfe85.exe 30 PID 2936 wrote to memory of 2628 2936 0464c8fb6d0d275b197e6424afdcfe85.exe 30 PID 2936 wrote to memory of 2628 2936 0464c8fb6d0d275b197e6424afdcfe85.exe 30 PID 2936 wrote to memory of 2628 2936 0464c8fb6d0d275b197e6424afdcfe85.exe 30 PID 2936 wrote to memory of 2628 2936 0464c8fb6d0d275b197e6424afdcfe85.exe 30 PID 2936 wrote to memory of 2628 2936 0464c8fb6d0d275b197e6424afdcfe85.exe 30 PID 2936 wrote to memory of 2628 2936 0464c8fb6d0d275b197e6424afdcfe85.exe 30 PID 2936 wrote to memory of 2628 2936 0464c8fb6d0d275b197e6424afdcfe85.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2628
-