Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 02:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
60ee6f9a2741eb675a9982dde799e8c6.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
60ee6f9a2741eb675a9982dde799e8c6.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
60ee6f9a2741eb675a9982dde799e8c6.exe
-
Size
580KB
-
MD5
60ee6f9a2741eb675a9982dde799e8c6
-
SHA1
2b6e981b82554135bc19c6fc554a9830fe90fa0b
-
SHA256
9baf7fbee2e201926f1b7974d5d09db33aece7bd49148a23b7108aed2cbbec5c
-
SHA512
03f9dc139b8f7226493512a5a2460621be40879bf94c5baf862e42b9e7528225a1969440a93082d44faade10532e1025cac14f034055e4294dbe74fa8c492b6a
-
SSDEEP
12288:KDOVYiGEVIoPzTJ3bHu6nOo88qfhS6a64OVGJfuGnl0W:KKBIWzTJDum+8qfgNlX
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
mail.farm-finn.com - Port:
587 - Username:
[email protected] - Password:
shanti@shant
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3152 set thread context of 4672 3152 60ee6f9a2741eb675a9982dde799e8c6.exe 85 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3152 60ee6f9a2741eb675a9982dde799e8c6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4672 60ee6f9a2741eb675a9982dde799e8c6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3152 wrote to memory of 4672 3152 60ee6f9a2741eb675a9982dde799e8c6.exe 85 PID 3152 wrote to memory of 4672 3152 60ee6f9a2741eb675a9982dde799e8c6.exe 85 PID 3152 wrote to memory of 4672 3152 60ee6f9a2741eb675a9982dde799e8c6.exe 85 PID 3152 wrote to memory of 4672 3152 60ee6f9a2741eb675a9982dde799e8c6.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\60ee6f9a2741eb675a9982dde799e8c6.exe"C:\Users\Admin\AppData\Local\Temp\60ee6f9a2741eb675a9982dde799e8c6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\60ee6f9a2741eb675a9982dde799e8c6.exe"C:\Users\Admin\AppData\Local\Temp\60ee6f9a2741eb675a9982dde799e8c6.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4672
-