Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 12:02
Static task
static1
Behavioral task
behavioral1
Sample
56688aac45f687d84e6c849c54e0a7df.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
56688aac45f687d84e6c849c54e0a7df.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
56688aac45f687d84e6c849c54e0a7df.exe
-
Size
720KB
-
MD5
56688aac45f687d84e6c849c54e0a7df
-
SHA1
16de7a0e6e04e270690298eb65371080d3ba845d
-
SHA256
cc940530ec434423139fc9ce98906ba0f74ad6d4d8f482148ad896da57b87f0d
-
SHA512
7a20a9069d52914095ac667ee877c62372ec9ec351d4f7e204efdfb2be6c57be59d54fc517bb0f639437aa45f0884fec14e38e3a51fbdc97be33dd2bc9532cbe
-
SSDEEP
12288:UtmbQmxRoMLzeDiWLq2KkzAhhv+bOCYE418hzx7O7PRuo2fHU1:UY05kmALoHYH18hVO7Zuoc01
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
netjul.xyz - Port:
587 - Username:
[email protected] - Password:
t+Ip=i&C}jY5
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/2308-9-0x00000000071E0000-0x000000000725C000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-10-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-11-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-13-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-15-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-17-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-19-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-21-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-23-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-25-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-27-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-29-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-31-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-33-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-35-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-37-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-39-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-41-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-43-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-45-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-47-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-49-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-51-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-53-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-55-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-57-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-59-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-61-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-63-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-65-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-67-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-69-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-71-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 behavioral2/memory/2308-73-0x00000000071E0000-0x0000000007256000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2308 set thread context of 4980 2308 56688aac45f687d84e6c849c54e0a7df.exe 107 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2308 56688aac45f687d84e6c849c54e0a7df.exe 2308 56688aac45f687d84e6c849c54e0a7df.exe 2308 56688aac45f687d84e6c849c54e0a7df.exe 2308 56688aac45f687d84e6c849c54e0a7df.exe 2308 56688aac45f687d84e6c849c54e0a7df.exe 2308 56688aac45f687d84e6c849c54e0a7df.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2308 56688aac45f687d84e6c849c54e0a7df.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4980 56688aac45f687d84e6c849c54e0a7df.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2308 wrote to memory of 3204 2308 56688aac45f687d84e6c849c54e0a7df.exe 106 PID 2308 wrote to memory of 3204 2308 56688aac45f687d84e6c849c54e0a7df.exe 106 PID 2308 wrote to memory of 3204 2308 56688aac45f687d84e6c849c54e0a7df.exe 106 PID 2308 wrote to memory of 4980 2308 56688aac45f687d84e6c849c54e0a7df.exe 107 PID 2308 wrote to memory of 4980 2308 56688aac45f687d84e6c849c54e0a7df.exe 107 PID 2308 wrote to memory of 4980 2308 56688aac45f687d84e6c849c54e0a7df.exe 107 PID 2308 wrote to memory of 4980 2308 56688aac45f687d84e6c849c54e0a7df.exe 107 PID 2308 wrote to memory of 4980 2308 56688aac45f687d84e6c849c54e0a7df.exe 107 PID 2308 wrote to memory of 4980 2308 56688aac45f687d84e6c849c54e0a7df.exe 107 PID 2308 wrote to memory of 4980 2308 56688aac45f687d84e6c849c54e0a7df.exe 107 PID 2308 wrote to memory of 4980 2308 56688aac45f687d84e6c849c54e0a7df.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\56688aac45f687d84e6c849c54e0a7df.exe"C:\Users\Admin\AppData\Local\Temp\56688aac45f687d84e6c849c54e0a7df.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\56688aac45f687d84e6c849c54e0a7df.exeC:\Users\Admin\AppData\Local\Temp\56688aac45f687d84e6c849c54e0a7df.exe2⤵PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\56688aac45f687d84e6c849c54e0a7df.exeC:\Users\Admin\AppData\Local\Temp\56688aac45f687d84e6c849c54e0a7df.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:4980
-