General

  • Target

    53f6d4b448f270023ee30f231c53cf5d

  • Size

    486KB

  • Sample

    240111-tjd5dabfg6

  • MD5

    53f6d4b448f270023ee30f231c53cf5d

  • SHA1

    c58946d81281aa1907c8e31273f67e14f3c8ba3b

  • SHA256

    b281be38a190ca97b700202096f56b29ff68740c0d40273f286e03d52685321e

  • SHA512

    18c08c35498c98545042b21592b6357806626a42c2eca4fb4333104e022696586d907c1b82d31693031cf9abd1b3a319500758e715fbadc7d04c0ea4d3e2bfea

  • SSDEEP

    12288:mxDp/GBC1aNaJ+W3YQyaOfujHwx7Eqi9gPQeuab:mdBGsQN49ozxIqJruw

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dm-teh.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Vm@(O;CO.vEQ

Targets

    • Target

      53f6d4b448f270023ee30f231c53cf5d

    • Size

      486KB

    • MD5

      53f6d4b448f270023ee30f231c53cf5d

    • SHA1

      c58946d81281aa1907c8e31273f67e14f3c8ba3b

    • SHA256

      b281be38a190ca97b700202096f56b29ff68740c0d40273f286e03d52685321e

    • SHA512

      18c08c35498c98545042b21592b6357806626a42c2eca4fb4333104e022696586d907c1b82d31693031cf9abd1b3a319500758e715fbadc7d04c0ea4d3e2bfea

    • SSDEEP

      12288:mxDp/GBC1aNaJ+W3YQyaOfujHwx7Eqi9gPQeuab:mdBGsQN49ozxIqJruw

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks