Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2023 21:46
Static task
static1
Behavioral task
behavioral1
Sample
0464c8fb6d0d275b197e6424afdcfe85.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0464c8fb6d0d275b197e6424afdcfe85.exe
Resource
win10v2004-20231215-en
General
-
Target
0464c8fb6d0d275b197e6424afdcfe85.exe
-
Size
921KB
-
MD5
0464c8fb6d0d275b197e6424afdcfe85
-
SHA1
1ee7b29c21aadc96befa2f624ef92d43f0c3cd36
-
SHA256
aee13239725c7dcc72761f58f97145f2972aaaf9dc9e91bf0dd5497cb063b21c
-
SHA512
62cdb4e05549629036f4f2c512e145f25cc8b82aa554ce038ac5134e6451bc96fda228ca087ad9b20f98fda394d743eceaa6d0030c6325f47b7052db778d192e
-
SSDEEP
12288:apivtpJkLZHCv06s5bg8OsvepzZFc9MZZw7cdRJfOB66vKkPJTQK6YhyB6A9mhne:LMH6sRbO0epzsiccdqB66vbTk
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.starkgulf.com - Port:
587 - Username:
[email protected] - Password:
info123#
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4832 set thread context of 1252 4832 0464c8fb6d0d275b197e6424afdcfe85.exe 92 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1252 0464c8fb6d0d275b197e6424afdcfe85.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4832 wrote to memory of 1252 4832 0464c8fb6d0d275b197e6424afdcfe85.exe 92 PID 4832 wrote to memory of 1252 4832 0464c8fb6d0d275b197e6424afdcfe85.exe 92 PID 4832 wrote to memory of 1252 4832 0464c8fb6d0d275b197e6424afdcfe85.exe 92 PID 4832 wrote to memory of 1252 4832 0464c8fb6d0d275b197e6424afdcfe85.exe 92 PID 4832 wrote to memory of 1252 4832 0464c8fb6d0d275b197e6424afdcfe85.exe 92 PID 4832 wrote to memory of 1252 4832 0464c8fb6d0d275b197e6424afdcfe85.exe 92 PID 4832 wrote to memory of 1252 4832 0464c8fb6d0d275b197e6424afdcfe85.exe 92 PID 4832 wrote to memory of 1252 4832 0464c8fb6d0d275b197e6424afdcfe85.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1252
-