Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 12:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
40da869663b70d81a92ec0bdb29ef61d.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
40da869663b70d81a92ec0bdb29ef61d.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
40da869663b70d81a92ec0bdb29ef61d.exe
-
Size
2.6MB
-
MD5
40da869663b70d81a92ec0bdb29ef61d
-
SHA1
c37ca05022049f320a6bf2e72a2be07e73004841
-
SHA256
3604207260cf40780709d081796c8e86cc810f688e2973b1d325b01f40169030
-
SHA512
53d5a6f170516ce2b497bdd941e919506f18ce61db7102f6b61d4e31ddaaa813ab727e3d7ed90d94fb2ea6e9bac5c65f32f14849dd10fbe31bf4ed2e093e1100
-
SSDEEP
24576:T8QxsrJyXFN1ggvYwM/KhgTkC+bLXu7ckQ6eHmPm:TVQJg/gFuRPG+
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
smtp.vivaldi.net - Port:
587 - Username:
[email protected] - Password:
67968664JeBlachqwin
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2744-4-0x0000000000300000-0x0000000000316000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2744 set thread context of 3032 2744 40da869663b70d81a92ec0bdb29ef61d.exe 28 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3032 40da869663b70d81a92ec0bdb29ef61d.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2744 wrote to memory of 3032 2744 40da869663b70d81a92ec0bdb29ef61d.exe 28 PID 2744 wrote to memory of 3032 2744 40da869663b70d81a92ec0bdb29ef61d.exe 28 PID 2744 wrote to memory of 3032 2744 40da869663b70d81a92ec0bdb29ef61d.exe 28 PID 2744 wrote to memory of 3032 2744 40da869663b70d81a92ec0bdb29ef61d.exe 28 PID 2744 wrote to memory of 3032 2744 40da869663b70d81a92ec0bdb29ef61d.exe 28 PID 2744 wrote to memory of 3032 2744 40da869663b70d81a92ec0bdb29ef61d.exe 28 PID 2744 wrote to memory of 3032 2744 40da869663b70d81a92ec0bdb29ef61d.exe 28 PID 2744 wrote to memory of 3032 2744 40da869663b70d81a92ec0bdb29ef61d.exe 28 PID 2744 wrote to memory of 3032 2744 40da869663b70d81a92ec0bdb29ef61d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\40da869663b70d81a92ec0bdb29ef61d.exe"C:\Users\Admin\AppData\Local\Temp\40da869663b70d81a92ec0bdb29ef61d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\40da869663b70d81a92ec0bdb29ef61d.exe"C:\Users\Admin\AppData\Local\Temp\40da869663b70d81a92ec0bdb29ef61d.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3032
-