General
-
Target
479de94fbadd83fce799ed3389da1ce5
-
Size
718KB
-
Sample
240107-bcwrqscgc4
-
MD5
479de94fbadd83fce799ed3389da1ce5
-
SHA1
4ae4c57faeab4e3b4cbf07f34c0cb12f542bc422
-
SHA256
1c29ee414b011a411db774015a98a8970bf90c3475f91f7547a16a8946cd5a81
-
SHA512
ca9aa4a42e762c430713ead37dddba74f1dac806cdf9282c3a06a6632c2f0e3e22d5754c989fdd743fa5df0ae26bb99179faf08da3c1d5735d6bed7826842e0f
-
SSDEEP
12288:qlALj79bDcDn7T9mWM+QirAsLyjgeUhDlhcfK56bKIy6Sa5iWK21lm2NRm05g6F:WAvhDcDVMGrAsLmbtfdbOl8R9/
Static task
static1
Behavioral task
behavioral1
Sample
479de94fbadd83fce799ed3389da1ce5.exe
Resource
win7-20231215-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
netjul.club - Port:
587 - Username:
[email protected] - Password:
5nBQc2~lJyET
Targets
-
-
Target
479de94fbadd83fce799ed3389da1ce5
-
Size
718KB
-
MD5
479de94fbadd83fce799ed3389da1ce5
-
SHA1
4ae4c57faeab4e3b4cbf07f34c0cb12f542bc422
-
SHA256
1c29ee414b011a411db774015a98a8970bf90c3475f91f7547a16a8946cd5a81
-
SHA512
ca9aa4a42e762c430713ead37dddba74f1dac806cdf9282c3a06a6632c2f0e3e22d5754c989fdd743fa5df0ae26bb99179faf08da3c1d5735d6bed7826842e0f
-
SSDEEP
12288:qlALj79bDcDn7T9mWM+QirAsLyjgeUhDlhcfK56bKIy6Sa5iWK21lm2NRm05g6F:WAvhDcDVMGrAsLmbtfdbOl8R9/
Score10/10-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-