General
-
Target
5dbd6684e5601b2f8e748e02fa898558
-
Size
892KB
-
Sample
240115-wr28aacebq
-
MD5
5dbd6684e5601b2f8e748e02fa898558
-
SHA1
9a83397decf87975576dbb4fced3d9b611846c39
-
SHA256
3d92d6a34be40684493e0cee2f5c772ec4a1f731cf8b371cad1eb9c492d9f63d
-
SHA512
79cdc806624ff9ad1e2f5e20280880db099055380d0d27a4560d846288280b4d076c3f2e0b4742e665454db3df1f2f9f9d84abacad8c17fea99dc7e1772e27d9
-
SSDEEP
12288:1FYf861bQyPlY7a3q6GQShv8me5CZMg/ln1/7x8a0Ti+l:1i06xQta3qxapkFLo2
Static task
static1
Behavioral task
behavioral1
Sample
5dbd6684e5601b2f8e748e02fa898558.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5dbd6684e5601b2f8e748e02fa898558.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
bojtai.xyz - Port:
587 - Username:
[email protected] - Password:
(mr.GT^Eg#C6
Targets
-
-
Target
5dbd6684e5601b2f8e748e02fa898558
-
Size
892KB
-
MD5
5dbd6684e5601b2f8e748e02fa898558
-
SHA1
9a83397decf87975576dbb4fced3d9b611846c39
-
SHA256
3d92d6a34be40684493e0cee2f5c772ec4a1f731cf8b371cad1eb9c492d9f63d
-
SHA512
79cdc806624ff9ad1e2f5e20280880db099055380d0d27a4560d846288280b4d076c3f2e0b4742e665454db3df1f2f9f9d84abacad8c17fea99dc7e1772e27d9
-
SSDEEP
12288:1FYf861bQyPlY7a3q6GQShv8me5CZMg/ln1/7x8a0Ti+l:1i06xQta3qxapkFLo2
Score10/10-
Detect ZGRat V1
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-