General
-
Target
40da869663b70d81a92ec0bdb29ef61d
-
Size
2.6MB
-
Sample
240104-plhs5aaad5
-
MD5
40da869663b70d81a92ec0bdb29ef61d
-
SHA1
c37ca05022049f320a6bf2e72a2be07e73004841
-
SHA256
3604207260cf40780709d081796c8e86cc810f688e2973b1d325b01f40169030
-
SHA512
53d5a6f170516ce2b497bdd941e919506f18ce61db7102f6b61d4e31ddaaa813ab727e3d7ed90d94fb2ea6e9bac5c65f32f14849dd10fbe31bf4ed2e093e1100
-
SSDEEP
24576:T8QxsrJyXFN1ggvYwM/KhgTkC+bLXu7ckQ6eHmPm:TVQJg/gFuRPG+
Static task
static1
Behavioral task
behavioral1
Sample
40da869663b70d81a92ec0bdb29ef61d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
40da869663b70d81a92ec0bdb29ef61d.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
smtp.vivaldi.net - Port:
587 - Username:
[email protected] - Password:
67968664JeBlachqwin
Targets
-
-
Target
40da869663b70d81a92ec0bdb29ef61d
-
Size
2.6MB
-
MD5
40da869663b70d81a92ec0bdb29ef61d
-
SHA1
c37ca05022049f320a6bf2e72a2be07e73004841
-
SHA256
3604207260cf40780709d081796c8e86cc810f688e2973b1d325b01f40169030
-
SHA512
53d5a6f170516ce2b497bdd941e919506f18ce61db7102f6b61d4e31ddaaa813ab727e3d7ed90d94fb2ea6e9bac5c65f32f14849dd10fbe31bf4ed2e093e1100
-
SSDEEP
24576:T8QxsrJyXFN1ggvYwM/KhgTkC+bLXu7ckQ6eHmPm:TVQJg/gFuRPG+
Score10/10-
Detect ZGRat V1
-
Suspicious use of SetThreadContext
-