General

  • Target

    2d7479c7725ea48ef2bde8ac454d2771

  • Size

    916KB

  • Sample

    231231-jb58saagb6

  • MD5

    2d7479c7725ea48ef2bde8ac454d2771

  • SHA1

    cc1ff66ff4cfbf6d9fd68e5544be870047c87f1f

  • SHA256

    4fcc150d5a31b78a9a619c62e95fd4a1e4e132a5cf261881b06e2f8a76f84e36

  • SHA512

    62b052f669ba909a30e1d314c366a56e41e489740efde24faaff305562dfe29b8e6bc23d24b7a50352912a2b2fd6c951cdb822470fd726a5416b19925b06bfd7

  • SSDEEP

    12288:lgBD8VRCxnU7BiGq8F+MJS/euQY7xypq6493RJvw91bo7jzvi2nTn2:tzCUNRq8F+oweuQKc4hRa/boXzvv

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mudanzasdistintas.com.ar
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    icui4cu2@@

Targets

    • Target

      2d7479c7725ea48ef2bde8ac454d2771

    • Size

      916KB

    • MD5

      2d7479c7725ea48ef2bde8ac454d2771

    • SHA1

      cc1ff66ff4cfbf6d9fd68e5544be870047c87f1f

    • SHA256

      4fcc150d5a31b78a9a619c62e95fd4a1e4e132a5cf261881b06e2f8a76f84e36

    • SHA512

      62b052f669ba909a30e1d314c366a56e41e489740efde24faaff305562dfe29b8e6bc23d24b7a50352912a2b2fd6c951cdb822470fd726a5416b19925b06bfd7

    • SSDEEP

      12288:lgBD8VRCxnU7BiGq8F+MJS/euQY7xypq6493RJvw91bo7jzvi2nTn2:tzCUNRq8F+oweuQKc4hRa/boXzvv

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks