Analysis
-
max time kernel
148s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
57ae9acddea94e91438697ff1c595845.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
57ae9acddea94e91438697ff1c595845.exe
Resource
win10v2004-20231215-en
General
-
Target
57ae9acddea94e91438697ff1c595845.exe
-
Size
673KB
-
MD5
57ae9acddea94e91438697ff1c595845
-
SHA1
2b8b0399de86cd0751a836621afe4b9c4d84f0e3
-
SHA256
5a2a0fcd0f1f6570a1a33be44d1291cda800b5ba8278b2d1d08cda35cacb8210
-
SHA512
c1fbae0cc41dad3f7dd6f000fcb05f0f0470fa57eb87a6f913be2b94ee003f0e0df55bac69c45a68e5628fb19b4249a9a69d77624d9e8b85c64cdad3528f06f9
-
SSDEEP
12288:2X9HWZs4IafPn9JsnYZqfSYeqj2fsLHzp9rsOHoPYsVDR+EfOpItajbw4v/lAlTy:s9HWfPjsnYZqfSqioHzp9rsOHZsZHUfv
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
bojtai.club - Port:
587 - Username:
[email protected] - Password:
hcx8knJINooP
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/720-8-0x00000000067A0000-0x000000000680A000-memory.dmp family_zgrat_v1 behavioral2/memory/720-9-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-10-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-12-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-14-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-16-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-18-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-20-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-22-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-32-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-34-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-38-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-36-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-40-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-30-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-28-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-26-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-24-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-42-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-44-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-46-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-56-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-58-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-54-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-66-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-70-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-72-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-68-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-64-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-62-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-60-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-52-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-50-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 behavioral2/memory/720-48-0x00000000067A0000-0x0000000006804000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 720 set thread context of 4616 720 57ae9acddea94e91438697ff1c595845.exe 108 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 720 57ae9acddea94e91438697ff1c595845.exe 720 57ae9acddea94e91438697ff1c595845.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 720 57ae9acddea94e91438697ff1c595845.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4616 57ae9acddea94e91438697ff1c595845.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 720 wrote to memory of 4616 720 57ae9acddea94e91438697ff1c595845.exe 108 PID 720 wrote to memory of 4616 720 57ae9acddea94e91438697ff1c595845.exe 108 PID 720 wrote to memory of 4616 720 57ae9acddea94e91438697ff1c595845.exe 108 PID 720 wrote to memory of 4616 720 57ae9acddea94e91438697ff1c595845.exe 108 PID 720 wrote to memory of 4616 720 57ae9acddea94e91438697ff1c595845.exe 108 PID 720 wrote to memory of 4616 720 57ae9acddea94e91438697ff1c595845.exe 108 PID 720 wrote to memory of 4616 720 57ae9acddea94e91438697ff1c595845.exe 108 PID 720 wrote to memory of 4616 720 57ae9acddea94e91438697ff1c595845.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\57ae9acddea94e91438697ff1c595845.exe"C:\Users\Admin\AppData\Local\Temp\57ae9acddea94e91438697ff1c595845.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\57ae9acddea94e91438697ff1c595845.exeC:\Users\Admin\AppData\Local\Temp\57ae9acddea94e91438697ff1c595845.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:4616
-