Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 17:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
30c9249824971b80aec6d2458374a09b.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
30c9249824971b80aec6d2458374a09b.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
30c9249824971b80aec6d2458374a09b.exe
-
Size
879KB
-
MD5
30c9249824971b80aec6d2458374a09b
-
SHA1
ba9c7ff0ebd880a0af019aba4948d898821318bd
-
SHA256
c6f6c1f109775f68b9be3920c5c46d0f5ae5b8b45d45c11abaf952b6098039a0
-
SHA512
1bcfce1e0ee81393e02f2e80521e48b2d6f22298d49f2fe10d0b7e3d2ab9fe472dcb7e19007d029d5d11c06535f3ce48ac402f00bad813b4124ffb7011bf2afd
-
SSDEEP
12288:aKoLScJXjvekjHRUhZFhcc1MNQpkzdsd7mWArXlQ02qTSS0+Y0Ut855u1e+cO:ENDfHR0NnUQ2moQc2S0+YJV9
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
smtp.1and1.es - Port:
587 - Username:
[email protected] - Password:
Somunics.1234
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2244 set thread context of 1524 2244 30c9249824971b80aec6d2458374a09b.exe 28 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2244 30c9249824971b80aec6d2458374a09b.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1524 30c9249824971b80aec6d2458374a09b.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1524 2244 30c9249824971b80aec6d2458374a09b.exe 28 PID 2244 wrote to memory of 1524 2244 30c9249824971b80aec6d2458374a09b.exe 28 PID 2244 wrote to memory of 1524 2244 30c9249824971b80aec6d2458374a09b.exe 28 PID 2244 wrote to memory of 1524 2244 30c9249824971b80aec6d2458374a09b.exe 28 PID 2244 wrote to memory of 1524 2244 30c9249824971b80aec6d2458374a09b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\30c9249824971b80aec6d2458374a09b.exe"C:\Users\Admin\AppData\Local\Temp\30c9249824971b80aec6d2458374a09b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\30c9249824971b80aec6d2458374a09b.exe"C:\Users\Admin\AppData\Local\Temp\30c9249824971b80aec6d2458374a09b.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1524
-