General
-
Target
391130ad385ed32583fd74ab73bb6c8e
-
Size
746KB
-
Sample
231231-rcx8kaabbq
-
MD5
391130ad385ed32583fd74ab73bb6c8e
-
SHA1
6c1c0fe4dff3cf10651eac1401217e3534a2bc7f
-
SHA256
1c5e928b5e27daa837d1ba10187397303520f5b18cf9b5da1eaf28b7f2ba0eda
-
SHA512
473946f7bc39b5145ff0e16323e54547766fd8e01183a7a0561c99776acd306a327eab17b5aed60736f557985443af8fe4eeb66b57daf7db94faac90dff7e04a
-
SSDEEP
12288:EPhS40kP3sfC6NezQkqef14elBrs0xdYRqp:EpSX7fCyLof14Qs0xa
Static task
static1
Behavioral task
behavioral1
Sample
391130ad385ed32583fd74ab73bb6c8e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
391130ad385ed32583fd74ab73bb6c8e.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
budgetn.xyz - Port:
587 - Username:
[email protected] - Password:
r[]w2e=V+]AV
Targets
-
-
Target
391130ad385ed32583fd74ab73bb6c8e
-
Size
746KB
-
MD5
391130ad385ed32583fd74ab73bb6c8e
-
SHA1
6c1c0fe4dff3cf10651eac1401217e3534a2bc7f
-
SHA256
1c5e928b5e27daa837d1ba10187397303520f5b18cf9b5da1eaf28b7f2ba0eda
-
SHA512
473946f7bc39b5145ff0e16323e54547766fd8e01183a7a0561c99776acd306a327eab17b5aed60736f557985443af8fe4eeb66b57daf7db94faac90dff7e04a
-
SSDEEP
12288:EPhS40kP3sfC6NezQkqef14elBrs0xdYRqp:EpSX7fCyLof14Qs0xa
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-