General

  • Target

    44c401c50cdbecf5f20fffd60e48628f

  • Size

    299KB

  • Sample

    240105-3115xaebe4

  • MD5

    44c401c50cdbecf5f20fffd60e48628f

  • SHA1

    6ba74f52e4e774f5762e99d7f49cc787f28353d4

  • SHA256

    e6407a39f1b2fb728a40612d6ca8e71d6dc004d9efb569f2f4d351ab693ac6f4

  • SHA512

    ae385fe48068210b45075d1b2433bb3606766f2e6fc17d9c14582040f2f2b64f411e1bcd29facc16fa59243987d894c7a084a573db032909e68a8d977d5108f3

  • SSDEEP

    6144:LWlg4qQdWyIAvEZ023cZ05Pi+xPwIwWFvAKbmWJI8xF7+Or:LQzAyIAvP7iwWyKb1+GqOr

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dm-teh.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Vm@(O;CO.vEQ

Targets

    • Target

      44c401c50cdbecf5f20fffd60e48628f

    • Size

      299KB

    • MD5

      44c401c50cdbecf5f20fffd60e48628f

    • SHA1

      6ba74f52e4e774f5762e99d7f49cc787f28353d4

    • SHA256

      e6407a39f1b2fb728a40612d6ca8e71d6dc004d9efb569f2f4d351ab693ac6f4

    • SHA512

      ae385fe48068210b45075d1b2433bb3606766f2e6fc17d9c14582040f2f2b64f411e1bcd29facc16fa59243987d894c7a084a573db032909e68a8d977d5108f3

    • SSDEEP

      6144:LWlg4qQdWyIAvEZ023cZ05Pi+xPwIwWFvAKbmWJI8xF7+Or:LQzAyIAvP7iwWyKb1+GqOr

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks