Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2023 22:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0ccdc2943e3e1547431cc0e813bde562.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
0ccdc2943e3e1547431cc0e813bde562.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
0ccdc2943e3e1547431cc0e813bde562.exe
-
Size
863KB
-
MD5
0ccdc2943e3e1547431cc0e813bde562
-
SHA1
d74c378a15dc009b83830c15d0e054c45ca96a22
-
SHA256
59b231e2140dff56658986b30ecfc13b38c883a911f4345d95d847d9c93795d9
-
SHA512
0b85770362f70f25b6c8b7ce436d8355a68b13e373583efb935d59e5e0e4eb408b1bae0813495e492bf41d10255f5f19c1e3bf56cb8ca4947f1971454fe36365
-
SSDEEP
12288:xroIYS+wYxMHYm0KX/A/GBg4MsjNskuEyhq36RnKwQ5t2yq4Qd:xVpXYxMbrkGB5M0Ns7qqtKv3q4Qd
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
mail.starkgulf.com - Port:
587 - Username:
[email protected] - Password:
info123#
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2892 set thread context of 1228 2892 0ccdc2943e3e1547431cc0e813bde562.exe 93 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1228 0ccdc2943e3e1547431cc0e813bde562.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2892 wrote to memory of 1228 2892 0ccdc2943e3e1547431cc0e813bde562.exe 93 PID 2892 wrote to memory of 1228 2892 0ccdc2943e3e1547431cc0e813bde562.exe 93 PID 2892 wrote to memory of 1228 2892 0ccdc2943e3e1547431cc0e813bde562.exe 93 PID 2892 wrote to memory of 1228 2892 0ccdc2943e3e1547431cc0e813bde562.exe 93 PID 2892 wrote to memory of 1228 2892 0ccdc2943e3e1547431cc0e813bde562.exe 93 PID 2892 wrote to memory of 1228 2892 0ccdc2943e3e1547431cc0e813bde562.exe 93 PID 2892 wrote to memory of 1228 2892 0ccdc2943e3e1547431cc0e813bde562.exe 93 PID 2892 wrote to memory of 1228 2892 0ccdc2943e3e1547431cc0e813bde562.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ccdc2943e3e1547431cc0e813bde562.exe"C:\Users\Admin\AppData\Local\Temp\0ccdc2943e3e1547431cc0e813bde562.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\0ccdc2943e3e1547431cc0e813bde562.exe"C:\Users\Admin\AppData\Local\Temp\0ccdc2943e3e1547431cc0e813bde562.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1228
-