General

  • Target

    659add09ffc62a07b044a31d8b0df624

  • Size

    677KB

  • Sample

    240118-vzf5caefh7

  • MD5

    659add09ffc62a07b044a31d8b0df624

  • SHA1

    bef7500a5e3a62295f102ef5f6f100597d78a546

  • SHA256

    6322ebb240ba18119193412e0ed7b325af171ec9ad48f61ce532cc120418c8d5

  • SHA512

    c6e3ad0164cab67bd53cbe0ca6b797693cfe3c674eaea79a592514b81cb00fc5fddbd1ea1ec237413c980800f30d6f6d75622d678f57adde2656b219cd4de227

  • SSDEEP

    12288:NR7f/bcjWlH5btCMw9eKo5yYQTgunHXa7AtKhUoYMiezxUlU:Nlf/bcqlH5bdBK3Z4qFeKlU

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    restd.xyz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    E^6666?VJo99/*

Targets

    • Target

      659add09ffc62a07b044a31d8b0df624

    • Size

      677KB

    • MD5

      659add09ffc62a07b044a31d8b0df624

    • SHA1

      bef7500a5e3a62295f102ef5f6f100597d78a546

    • SHA256

      6322ebb240ba18119193412e0ed7b325af171ec9ad48f61ce532cc120418c8d5

    • SHA512

      c6e3ad0164cab67bd53cbe0ca6b797693cfe3c674eaea79a592514b81cb00fc5fddbd1ea1ec237413c980800f30d6f6d75622d678f57adde2656b219cd4de227

    • SSDEEP

      12288:NR7f/bcjWlH5btCMw9eKo5yYQTgunHXa7AtKhUoYMiezxUlU:Nlf/bcqlH5bdBK3Z4qFeKlU

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks