General
-
Target
3b2f66471cc56be88ace1fe40c93b8a2
-
Size
587KB
-
Sample
231231-128v2aehfn
-
MD5
3b2f66471cc56be88ace1fe40c93b8a2
-
SHA1
486da8068d9f6c810c36f9f9569ef34683f72fa2
-
SHA256
2476f5a94267f2702b73311feaaf335932c1f530b89f6af69122bdb1d8e72345
-
SHA512
38922399e51e2111e3be4f7417ee46fba82bd12dd59be1e08151dd69679c1feeb4bc2c2a458ece77f3bd3b3a8820f9ebdfb4adb388545d956963958b637ec174
-
SSDEEP
12288:FycFlEQ6I1pOq0NeVyC0Wf1cyDBB40rjoTgB:FysEmoqEnYf1cE40rki
Static task
static1
Behavioral task
behavioral1
Sample
3b2f66471cc56be88ace1fe40c93b8a2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b2f66471cc56be88ace1fe40c93b8a2.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
budgetn.shop - Port:
587 - Username:
[email protected] - Password:
X&Y=[g89L4D/**
Targets
-
-
Target
3b2f66471cc56be88ace1fe40c93b8a2
-
Size
587KB
-
MD5
3b2f66471cc56be88ace1fe40c93b8a2
-
SHA1
486da8068d9f6c810c36f9f9569ef34683f72fa2
-
SHA256
2476f5a94267f2702b73311feaaf335932c1f530b89f6af69122bdb1d8e72345
-
SHA512
38922399e51e2111e3be4f7417ee46fba82bd12dd59be1e08151dd69679c1feeb4bc2c2a458ece77f3bd3b3a8820f9ebdfb4adb388545d956963958b637ec174
-
SSDEEP
12288:FycFlEQ6I1pOq0NeVyC0Wf1cyDBB40rjoTgB:FysEmoqEnYf1cE40rki
Score10/10-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-