Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 16:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
53f6d4b448f270023ee30f231c53cf5d.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
53f6d4b448f270023ee30f231c53cf5d.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
53f6d4b448f270023ee30f231c53cf5d.exe
-
Size
486KB
-
MD5
53f6d4b448f270023ee30f231c53cf5d
-
SHA1
c58946d81281aa1907c8e31273f67e14f3c8ba3b
-
SHA256
b281be38a190ca97b700202096f56b29ff68740c0d40273f286e03d52685321e
-
SHA512
18c08c35498c98545042b21592b6357806626a42c2eca4fb4333104e022696586d907c1b82d31693031cf9abd1b3a319500758e715fbadc7d04c0ea4d3e2bfea
-
SSDEEP
12288:mxDp/GBC1aNaJ+W3YQyaOfujHwx7Eqi9gPQeuab:mdBGsQN49ozxIqJruw
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
mail.dm-teh.com - Port:
587 - Username:
[email protected] - Password:
Vm@(O;CO.vEQ
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 660 set thread context of 2672 660 53f6d4b448f270023ee30f231c53cf5d.exe 29 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 660 53f6d4b448f270023ee30f231c53cf5d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2672 53f6d4b448f270023ee30f231c53cf5d.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 660 wrote to memory of 2672 660 53f6d4b448f270023ee30f231c53cf5d.exe 29 PID 660 wrote to memory of 2672 660 53f6d4b448f270023ee30f231c53cf5d.exe 29 PID 660 wrote to memory of 2672 660 53f6d4b448f270023ee30f231c53cf5d.exe 29 PID 660 wrote to memory of 2672 660 53f6d4b448f270023ee30f231c53cf5d.exe 29 PID 660 wrote to memory of 2672 660 53f6d4b448f270023ee30f231c53cf5d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\53f6d4b448f270023ee30f231c53cf5d.exe"C:\Users\Admin\AppData\Local\Temp\53f6d4b448f270023ee30f231c53cf5d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\53f6d4b448f270023ee30f231c53cf5d.exe"C:\Users\Admin\AppData\Local\Temp\53f6d4b448f270023ee30f231c53cf5d.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2672
-