Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 07:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2d7479c7725ea48ef2bde8ac454d2771.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2d7479c7725ea48ef2bde8ac454d2771.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
2d7479c7725ea48ef2bde8ac454d2771.exe
-
Size
916KB
-
MD5
2d7479c7725ea48ef2bde8ac454d2771
-
SHA1
cc1ff66ff4cfbf6d9fd68e5544be870047c87f1f
-
SHA256
4fcc150d5a31b78a9a619c62e95fd4a1e4e132a5cf261881b06e2f8a76f84e36
-
SHA512
62b052f669ba909a30e1d314c366a56e41e489740efde24faaff305562dfe29b8e6bc23d24b7a50352912a2b2fd6c951cdb822470fd726a5416b19925b06bfd7
-
SSDEEP
12288:lgBD8VRCxnU7BiGq8F+MJS/euQY7xypq6493RJvw91bo7jzvi2nTn2:tzCUNRq8F+oweuQKc4hRa/boXzvv
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
mail.mudanzasdistintas.com.ar - Port:
587 - Username:
[email protected] - Password:
icui4cu2@@
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 616 set thread context of 4656 616 2d7479c7725ea48ef2bde8ac454d2771.exe 102 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4656 2d7479c7725ea48ef2bde8ac454d2771.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 616 wrote to memory of 4656 616 2d7479c7725ea48ef2bde8ac454d2771.exe 102 PID 616 wrote to memory of 4656 616 2d7479c7725ea48ef2bde8ac454d2771.exe 102 PID 616 wrote to memory of 4656 616 2d7479c7725ea48ef2bde8ac454d2771.exe 102 PID 616 wrote to memory of 4656 616 2d7479c7725ea48ef2bde8ac454d2771.exe 102 PID 616 wrote to memory of 4656 616 2d7479c7725ea48ef2bde8ac454d2771.exe 102 PID 616 wrote to memory of 4656 616 2d7479c7725ea48ef2bde8ac454d2771.exe 102 PID 616 wrote to memory of 4656 616 2d7479c7725ea48ef2bde8ac454d2771.exe 102 PID 616 wrote to memory of 4656 616 2d7479c7725ea48ef2bde8ac454d2771.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d7479c7725ea48ef2bde8ac454d2771.exe"C:\Users\Admin\AppData\Local\Temp\2d7479c7725ea48ef2bde8ac454d2771.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\2d7479c7725ea48ef2bde8ac454d2771.exe"C:\Users\Admin\AppData\Local\Temp\2d7479c7725ea48ef2bde8ac454d2771.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4656
-