General
-
Target
042197f208629a740b617e67f812802d
-
Size
818KB
-
Sample
231229-z1962aefb5
-
MD5
042197f208629a740b617e67f812802d
-
SHA1
a419c73824ee970da50710233183221e80740882
-
SHA256
8065d62b80b44048da2480ce5eb7b1b2ddfc432abee9a9ae8c892d45ffc9e662
-
SHA512
d776f2c2cc031d2475e3e7e7d55e03a96bf85b08ebaa0b98247d80072e80a8d76e581d88ec21f0d462f58b21c12b1260a49cdfd5166624202c201153dbc7501e
-
SSDEEP
12288:xqern0oyddJoHAx87CemFNMSqjQled+Cmif1Y0lB1asF9kwCGayYM:RrEbZprEf1YoasFtCQp
Static task
static1
Behavioral task
behavioral1
Sample
042197f208629a740b617e67f812802d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
042197f208629a740b617e67f812802d.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
budgetn.xyz - Port:
587 - Username:
[email protected] - Password:
E6uOyau@R_(Q
Targets
-
-
Target
042197f208629a740b617e67f812802d
-
Size
818KB
-
MD5
042197f208629a740b617e67f812802d
-
SHA1
a419c73824ee970da50710233183221e80740882
-
SHA256
8065d62b80b44048da2480ce5eb7b1b2ddfc432abee9a9ae8c892d45ffc9e662
-
SHA512
d776f2c2cc031d2475e3e7e7d55e03a96bf85b08ebaa0b98247d80072e80a8d76e581d88ec21f0d462f58b21c12b1260a49cdfd5166624202c201153dbc7501e
-
SSDEEP
12288:xqern0oyddJoHAx87CemFNMSqjQled+Cmif1Y0lB1asF9kwCGayYM:RrEbZprEf1YoasFtCQp
Score10/10-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-