General

  • Target

    5f7134568181281194c9d80c2cba6027

  • Size

    1.0MB

  • Sample

    240116-kjmbbahce3

  • MD5

    5f7134568181281194c9d80c2cba6027

  • SHA1

    7c63780e87612a84afdc50d1b0a463c5f27c1e53

  • SHA256

    dafada11163e9ed5459a4759f6f18561db820214a5ce6f0752083af1faf70369

  • SHA512

    72d9ff25d2c158a5ae371a5d0d5a16f61a8c5b3974f6c3f407fcb94ab44e9f3ba3cec95429d2b2417558e7e1e919e90154830da7102cce68d7370e2b8f237867

  • SSDEEP

    24576:zqqoAUj2c1x9TGP5wJXcb7UfFku94VNpL8JxkE:zqaU3hyP5wJXc6ku9UL8DkE

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.starkgulf.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    info123#

Targets

    • Target

      5f7134568181281194c9d80c2cba6027

    • Size

      1.0MB

    • MD5

      5f7134568181281194c9d80c2cba6027

    • SHA1

      7c63780e87612a84afdc50d1b0a463c5f27c1e53

    • SHA256

      dafada11163e9ed5459a4759f6f18561db820214a5ce6f0752083af1faf70369

    • SHA512

      72d9ff25d2c158a5ae371a5d0d5a16f61a8c5b3974f6c3f407fcb94ab44e9f3ba3cec95429d2b2417558e7e1e919e90154830da7102cce68d7370e2b8f237867

    • SSDEEP

      24576:zqqoAUj2c1x9TGP5wJXcb7UfFku94VNpL8JxkE:zqaU3hyP5wJXc6ku9UL8DkE

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks