Analysis
-
max time kernel
151s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 05:38
Static task
static1
Behavioral task
behavioral1
Sample
2a52adef8906a92fa4b4feb96c1b8c26.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
2a52adef8906a92fa4b4feb96c1b8c26.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
2a52adef8906a92fa4b4feb96c1b8c26.exe
-
Size
707KB
-
MD5
2a52adef8906a92fa4b4feb96c1b8c26
-
SHA1
5bc7a3c740295e6e0a0c2455be73c5c6669a8171
-
SHA256
8940eb56fcbcf0b9e9f1ca34b9e2671bf9f0494eed2b00254cc916378337c0bd
-
SHA512
09f6c07b2d09937aa12c8befcceab02e8069ee661a97dc39af6531ae8277f7c10680eb3375ce2ad8a6111561af829d4ef543220beeeb6b86fdc85b4d44055caf
-
SSDEEP
12288:aPtYLDXEk6PT0/ZxSnw7NGUNIXIo6RPuxR51ee0PRNuU1:AtYLDUk6Pwkw5dkIo6RjzPv1
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
restd.xyz - Port:
587 - Username:
[email protected] - Password:
E^6666?VJo99/*
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/456-9-0x0000000006E10000-0x0000000006E92000-memory.dmp family_zgrat_v1 behavioral2/memory/456-10-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-11-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-13-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-15-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-17-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-29-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-39-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-43-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-57-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-69-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-73-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-71-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-67-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-65-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-63-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-61-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-59-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-55-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-53-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-51-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-49-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-47-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-45-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-41-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-37-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-35-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-33-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-31-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-27-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-25-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-23-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-21-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 behavioral2/memory/456-19-0x0000000006E10000-0x0000000006E8B000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 456 set thread context of 1268 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 109 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 456 2a52adef8906a92fa4b4feb96c1b8c26.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 456 2a52adef8906a92fa4b4feb96c1b8c26.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1268 2a52adef8906a92fa4b4feb96c1b8c26.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 456 wrote to memory of 3352 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 108 PID 456 wrote to memory of 3352 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 108 PID 456 wrote to memory of 3352 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 108 PID 456 wrote to memory of 1268 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 109 PID 456 wrote to memory of 1268 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 109 PID 456 wrote to memory of 1268 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 109 PID 456 wrote to memory of 1268 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 109 PID 456 wrote to memory of 1268 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 109 PID 456 wrote to memory of 1268 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 109 PID 456 wrote to memory of 1268 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 109 PID 456 wrote to memory of 1268 456 2a52adef8906a92fa4b4feb96c1b8c26.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a52adef8906a92fa4b4feb96c1b8c26.exe"C:\Users\Admin\AppData\Local\Temp\2a52adef8906a92fa4b4feb96c1b8c26.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\2a52adef8906a92fa4b4feb96c1b8c26.exeC:\Users\Admin\AppData\Local\Temp\2a52adef8906a92fa4b4feb96c1b8c26.exe2⤵PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\2a52adef8906a92fa4b4feb96c1b8c26.exeC:\Users\Admin\AppData\Local\Temp\2a52adef8906a92fa4b4feb96c1b8c26.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1268
-