Analysis
-
max time kernel
42s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 00:39
Static task
static1
Behavioral task
behavioral1
Sample
470621f5aef9787e21b629735c1a5f9f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
470621f5aef9787e21b629735c1a5f9f.exe
Resource
win10v2004-20231215-en
General
-
Target
470621f5aef9787e21b629735c1a5f9f.exe
-
Size
1.3MB
-
MD5
470621f5aef9787e21b629735c1a5f9f
-
SHA1
be32079fc5d6662582685689c644322642073778
-
SHA256
d0b801a4ea3be10c3cf2dfff06e2437c9d96e4cbe5be96483c00a4c10b27d2c5
-
SHA512
9e321a30ae8d88c13f96033fd63a7a5bb78a35c2bb1edbe02c30109df518c07c54a72f29c3f11c9573943483ac2fb5e273d8ad2054e30458396b5de6f78c534c
-
SSDEEP
24576:P4S/d3rKzksfks2y8jIGReCFlolhhNxuNeG5Gm+8MN6ZNBZ:TKqYGRzlWoejmcN6ZNB
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.sabaint.me - Port:
587 - Username:
[email protected] - Password:
regina1983-
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/2732-7-0x0000000004F50000-0x0000000004F62000-memory.dmp CustAttr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2324 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\470621f5aef9787e21b629735c1a5f9f.exe"C:\Users\Admin\AppData\Local\Temp\470621f5aef9787e21b629735c1a5f9f.exe"1⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\470621f5aef9787e21b629735c1a5f9f.exe"C:\Users\Admin\AppData\Local\Temp\470621f5aef9787e21b629735c1a5f9f.exe"2⤵PID:1464
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\NET4\PASSWORDSNET4.exe3⤵PID:452
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eVSwXOCV" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEFFD.tmp"2⤵
- Creates scheduled task(s)
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD561e75b93e719b2ac8863e99ac87377de
SHA1f029016cdee7be81729f8b3975888b8f59ff4b78
SHA2566dfda2c4ac93b71da9b074d3919bbc9ca65153cf13f388fb31def462b56dc883
SHA5125149c6dc349453666ace87c863d80ffd43ab1b11dc82d70b3cb44674dbf993c7cf98fb1ee0277f3c26341cf753dce154db9e4004a2706d1f5f8c1fbe41b807bf
-
Filesize
24B
MD598a833e15d18697e8e56cdafb0642647
SHA1e5f94d969899646a3d4635f28a7cd9dd69705887
SHA256ff006c86b5ec033fe3cafd759bf75be00e50c375c75157e99c0c5d39c96a2a6c
SHA512c6f9a09d9707b770dbc10d47c4d9b949f4ebf5f030b5ef8c511b635c32d418ad25d72eee5d7ed02a96aeb8bf2c85491ca1aa0e4336d242793c886ed1bcdd910b
-
Filesize
525B
MD57c1557d9476dedfbccf26684753c441b
SHA1c3f226901d593c4e28a7a4e62671a287c71bc653
SHA2568a8f9236bab52ccb349624743780a72b5184451882efcb0ad1bd5d87e24cbd8e
SHA51291ffcfb49eae63fa2ecb030bbc18743e6a814b6e848c51dbc1d35d4ebd9d6cde15849268c2711e3b7c7947d90dfcada237907dbeedc04e4c333e0b31a84e68d6
-
Filesize
1KB
MD53552c157193c1532fe73a9c5ad258e5c
SHA14c6c010902971af7cf38d5b433a278739ab00dd7
SHA256520315050867d504260051c5b0ef597ccc749edca282c413a62f8b4d798a15b8
SHA5120d93adafee81750d67047ca979751c72cefe7e24f721018155b453e1306b29b46eebbc2433ab346ec6a8b02bac319a81f335c9ee94907fcefec2b5c67a18bc77