Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13-01-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
57ae9acddea94e91438697ff1c595845.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
57ae9acddea94e91438697ff1c595845.exe
Resource
win10v2004-20231215-en
General
-
Target
57ae9acddea94e91438697ff1c595845.exe
-
Size
673KB
-
MD5
57ae9acddea94e91438697ff1c595845
-
SHA1
2b8b0399de86cd0751a836621afe4b9c4d84f0e3
-
SHA256
5a2a0fcd0f1f6570a1a33be44d1291cda800b5ba8278b2d1d08cda35cacb8210
-
SHA512
c1fbae0cc41dad3f7dd6f000fcb05f0f0470fa57eb87a6f913be2b94ee003f0e0df55bac69c45a68e5628fb19b4249a9a69d77624d9e8b85c64cdad3528f06f9
-
SSDEEP
12288:2X9HWZs4IafPn9JsnYZqfSYeqj2fsLHzp9rsOHoPYsVDR+EfOpItajbw4v/lAlTy:s9HWfPjsnYZqfSqioHzp9rsOHZsZHUfv
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
bojtai.club - Port:
587 - Username:
[email protected] - Password:
hcx8knJINooP
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/776-5-0x00000000045F0000-0x000000000465A000-memory.dmp family_zgrat_v1 behavioral1/memory/776-6-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-7-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-9-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-11-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-13-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-45-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-69-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-67-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-65-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-63-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-61-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-59-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-57-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-55-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-53-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-51-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-49-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-47-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-43-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-41-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-39-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-37-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-35-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-33-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-31-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-29-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-27-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-25-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-23-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-21-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-19-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-17-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 behavioral1/memory/776-15-0x00000000045F0000-0x0000000004654000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 776 set thread context of 1596 776 57ae9acddea94e91438697ff1c595845.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 776 57ae9acddea94e91438697ff1c595845.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 776 57ae9acddea94e91438697ff1c595845.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1596 57ae9acddea94e91438697ff1c595845.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 776 wrote to memory of 1596 776 57ae9acddea94e91438697ff1c595845.exe 30 PID 776 wrote to memory of 1596 776 57ae9acddea94e91438697ff1c595845.exe 30 PID 776 wrote to memory of 1596 776 57ae9acddea94e91438697ff1c595845.exe 30 PID 776 wrote to memory of 1596 776 57ae9acddea94e91438697ff1c595845.exe 30 PID 776 wrote to memory of 1596 776 57ae9acddea94e91438697ff1c595845.exe 30 PID 776 wrote to memory of 1596 776 57ae9acddea94e91438697ff1c595845.exe 30 PID 776 wrote to memory of 1596 776 57ae9acddea94e91438697ff1c595845.exe 30 PID 776 wrote to memory of 1596 776 57ae9acddea94e91438697ff1c595845.exe 30 PID 776 wrote to memory of 1596 776 57ae9acddea94e91438697ff1c595845.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\57ae9acddea94e91438697ff1c595845.exe"C:\Users\Admin\AppData\Local\Temp\57ae9acddea94e91438697ff1c595845.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\57ae9acddea94e91438697ff1c595845.exeC:\Users\Admin\AppData\Local\Temp\57ae9acddea94e91438697ff1c595845.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1596
-