General
-
Target
51e9ae4378cb38ff331ad95f35cba605
-
Size
660KB
-
Sample
240110-3ff91abbb3
-
MD5
51e9ae4378cb38ff331ad95f35cba605
-
SHA1
8b37a8eb9536972a6bada81d92c109f76ef4b292
-
SHA256
e56c3eed11cf94d29ac1c24369887112b374e3053b371cafbbab9bc176e12b77
-
SHA512
5da0a8dc125c2d2cd23ab737e0d9b7a1ee65b21629bbdc867f6890d3a93c20f0c03784184c31a4953a62fb2a4c4e7ff05a81901185db1e3848dc7d61aba845ba
-
SSDEEP
12288:h8Rjc7UCAIf16KRBhc0ddzKwNkjOaOJ1zoKjquWO:ShNKf166c0dY9EyKOv
Static task
static1
Behavioral task
behavioral1
Sample
51e9ae4378cb38ff331ad95f35cba605.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51e9ae4378cb38ff331ad95f35cba605.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
efinancet.shop - Port:
587 - Username:
[email protected] - Password:
hXRv^@_E-~Nk
Targets
-
-
Target
51e9ae4378cb38ff331ad95f35cba605
-
Size
660KB
-
MD5
51e9ae4378cb38ff331ad95f35cba605
-
SHA1
8b37a8eb9536972a6bada81d92c109f76ef4b292
-
SHA256
e56c3eed11cf94d29ac1c24369887112b374e3053b371cafbbab9bc176e12b77
-
SHA512
5da0a8dc125c2d2cd23ab737e0d9b7a1ee65b21629bbdc867f6890d3a93c20f0c03784184c31a4953a62fb2a4c4e7ff05a81901185db1e3848dc7d61aba845ba
-
SSDEEP
12288:h8Rjc7UCAIf16KRBhc0ddzKwNkjOaOJ1zoKjquWO:ShNKf166c0dY9EyKOv
Score10/10-
Detect ZGRat V1
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-