Analysis
-
max time kernel
137s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2023 20:41
Static task
static1
Behavioral task
behavioral1
Sample
0464c8fb6d0d275b197e6424afdcfe85.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0464c8fb6d0d275b197e6424afdcfe85.exe
Resource
win10v2004-20231215-en
General
-
Target
0464c8fb6d0d275b197e6424afdcfe85.exe
-
Size
921KB
-
MD5
0464c8fb6d0d275b197e6424afdcfe85
-
SHA1
1ee7b29c21aadc96befa2f624ef92d43f0c3cd36
-
SHA256
aee13239725c7dcc72761f58f97145f2972aaaf9dc9e91bf0dd5497cb063b21c
-
SHA512
62cdb4e05549629036f4f2c512e145f25cc8b82aa554ce038ac5134e6451bc96fda228ca087ad9b20f98fda394d743eceaa6d0030c6325f47b7052db778d192e
-
SSDEEP
12288:apivtpJkLZHCv06s5bg8OsvepzZFc9MZZw7cdRJfOB66vKkPJTQK6YhyB6A9mhne:LMH6sRbO0epzsiccdqB66vbTk
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.starkgulf.com - Port:
587 - Username:
[email protected] - Password:
info123#
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2840 set thread context of 4184 2840 0464c8fb6d0d275b197e6424afdcfe85.exe 95 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4184 0464c8fb6d0d275b197e6424afdcfe85.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2840 wrote to memory of 4184 2840 0464c8fb6d0d275b197e6424afdcfe85.exe 95 PID 2840 wrote to memory of 4184 2840 0464c8fb6d0d275b197e6424afdcfe85.exe 95 PID 2840 wrote to memory of 4184 2840 0464c8fb6d0d275b197e6424afdcfe85.exe 95 PID 2840 wrote to memory of 4184 2840 0464c8fb6d0d275b197e6424afdcfe85.exe 95 PID 2840 wrote to memory of 4184 2840 0464c8fb6d0d275b197e6424afdcfe85.exe 95 PID 2840 wrote to memory of 4184 2840 0464c8fb6d0d275b197e6424afdcfe85.exe 95 PID 2840 wrote to memory of 4184 2840 0464c8fb6d0d275b197e6424afdcfe85.exe 95 PID 2840 wrote to memory of 4184 2840 0464c8fb6d0d275b197e6424afdcfe85.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"C:\Users\Admin\AppData\Local\Temp\0464c8fb6d0d275b197e6424afdcfe85.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4184
-