General

  • Target

    6d10f518c4de138b5c18d2f4dbd895bc

  • Size

    727KB

  • Sample

    231222-fn9vysgbem

  • MD5

    6d10f518c4de138b5c18d2f4dbd895bc

  • SHA1

    24eaf3a15a15111d304992b6a7a934610c6d28dc

  • SHA256

    582741317b53c32600953ffc2daf7f02f32f9153f90a1f0ff6166f3791b52404

  • SHA512

    68dd265f8b47289e71439217c457be7507d59f618a1630e94f13ed585c1d6febe8b3c8ced735810cf39b9b74d52affd64c382d73566c21fa5f0e7d171f1c97e5

  • SSDEEP

    12288:csyxZCYQneRW88If1cmRBPA0nV2sb+xUVWcyNc:cjZCr7gf1cIA0nos6Cn/

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    budgetn.shop
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    X&Y=[g89L4D/**

Targets

    • Target

      6d10f518c4de138b5c18d2f4dbd895bc

    • Size

      727KB

    • MD5

      6d10f518c4de138b5c18d2f4dbd895bc

    • SHA1

      24eaf3a15a15111d304992b6a7a934610c6d28dc

    • SHA256

      582741317b53c32600953ffc2daf7f02f32f9153f90a1f0ff6166f3791b52404

    • SHA512

      68dd265f8b47289e71439217c457be7507d59f618a1630e94f13ed585c1d6febe8b3c8ced735810cf39b9b74d52affd64c382d73566c21fa5f0e7d171f1c97e5

    • SSDEEP

      12288:csyxZCYQneRW88If1cmRBPA0nV2sb+xUVWcyNc:cjZCr7gf1cIA0nos6Cn/

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks