General
-
Target
470621f5aef9787e21b629735c1a5f9f
-
Size
1.3MB
-
Sample
231226-azv82sehaj
-
MD5
470621f5aef9787e21b629735c1a5f9f
-
SHA1
be32079fc5d6662582685689c644322642073778
-
SHA256
d0b801a4ea3be10c3cf2dfff06e2437c9d96e4cbe5be96483c00a4c10b27d2c5
-
SHA512
9e321a30ae8d88c13f96033fd63a7a5bb78a35c2bb1edbe02c30109df518c07c54a72f29c3f11c9573943483ac2fb5e273d8ad2054e30458396b5de6f78c534c
-
SSDEEP
24576:P4S/d3rKzksfks2y8jIGReCFlolhhNxuNeG5Gm+8MN6ZNBZ:TKqYGRzlWoejmcN6ZNB
Static task
static1
Behavioral task
behavioral1
Sample
470621f5aef9787e21b629735c1a5f9f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
470621f5aef9787e21b629735c1a5f9f.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.sabaint.me - Port:
587 - Username:
[email protected] - Password:
regina1983-
Targets
-
-
Target
470621f5aef9787e21b629735c1a5f9f
-
Size
1.3MB
-
MD5
470621f5aef9787e21b629735c1a5f9f
-
SHA1
be32079fc5d6662582685689c644322642073778
-
SHA256
d0b801a4ea3be10c3cf2dfff06e2437c9d96e4cbe5be96483c00a4c10b27d2c5
-
SHA512
9e321a30ae8d88c13f96033fd63a7a5bb78a35c2bb1edbe02c30109df518c07c54a72f29c3f11c9573943483ac2fb5e273d8ad2054e30458396b5de6f78c534c
-
SSDEEP
24576:P4S/d3rKzksfks2y8jIGReCFlolhhNxuNeG5Gm+8MN6ZNBZ:TKqYGRzlWoejmcN6ZNB
Score10/10-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-