Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 17:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
659add09ffc62a07b044a31d8b0df624.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
659add09ffc62a07b044a31d8b0df624.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
659add09ffc62a07b044a31d8b0df624.exe
-
Size
677KB
-
MD5
659add09ffc62a07b044a31d8b0df624
-
SHA1
bef7500a5e3a62295f102ef5f6f100597d78a546
-
SHA256
6322ebb240ba18119193412e0ed7b325af171ec9ad48f61ce532cc120418c8d5
-
SHA512
c6e3ad0164cab67bd53cbe0ca6b797693cfe3c674eaea79a592514b81cb00fc5fddbd1ea1ec237413c980800f30d6f6d75622d678f57adde2656b219cd4de227
-
SSDEEP
12288:NR7f/bcjWlH5btCMw9eKo5yYQTgunHXa7AtKhUoYMiezxUlU:Nlf/bcqlH5bdBK3Z4qFeKlU
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
restd.xyz - Port:
587 - Username:
[email protected] - Password:
E^6666?VJo99/*
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2076-4-0x0000000004A90000-0x0000000004B02000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-5-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-10-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-12-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-14-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-8-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-6-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-22-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-20-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-18-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-16-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-52-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-56-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-60-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-68-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-66-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-64-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-62-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-58-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-54-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-50-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-48-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-46-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-44-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-42-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-40-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-38-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-36-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-34-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-32-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-30-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-28-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-26-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 behavioral1/memory/2076-24-0x0000000004A90000-0x0000000004AFC000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2076 set thread context of 912 2076 659add09ffc62a07b044a31d8b0df624.exe 31 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2076 659add09ffc62a07b044a31d8b0df624.exe 2076 659add09ffc62a07b044a31d8b0df624.exe 2076 659add09ffc62a07b044a31d8b0df624.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2076 659add09ffc62a07b044a31d8b0df624.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 912 659add09ffc62a07b044a31d8b0df624.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2076 wrote to memory of 1496 2076 659add09ffc62a07b044a31d8b0df624.exe 30 PID 2076 wrote to memory of 1496 2076 659add09ffc62a07b044a31d8b0df624.exe 30 PID 2076 wrote to memory of 1496 2076 659add09ffc62a07b044a31d8b0df624.exe 30 PID 2076 wrote to memory of 1496 2076 659add09ffc62a07b044a31d8b0df624.exe 30 PID 2076 wrote to memory of 912 2076 659add09ffc62a07b044a31d8b0df624.exe 31 PID 2076 wrote to memory of 912 2076 659add09ffc62a07b044a31d8b0df624.exe 31 PID 2076 wrote to memory of 912 2076 659add09ffc62a07b044a31d8b0df624.exe 31 PID 2076 wrote to memory of 912 2076 659add09ffc62a07b044a31d8b0df624.exe 31 PID 2076 wrote to memory of 912 2076 659add09ffc62a07b044a31d8b0df624.exe 31 PID 2076 wrote to memory of 912 2076 659add09ffc62a07b044a31d8b0df624.exe 31 PID 2076 wrote to memory of 912 2076 659add09ffc62a07b044a31d8b0df624.exe 31 PID 2076 wrote to memory of 912 2076 659add09ffc62a07b044a31d8b0df624.exe 31 PID 2076 wrote to memory of 912 2076 659add09ffc62a07b044a31d8b0df624.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\659add09ffc62a07b044a31d8b0df624.exe"C:\Users\Admin\AppData\Local\Temp\659add09ffc62a07b044a31d8b0df624.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\659add09ffc62a07b044a31d8b0df624.exeC:\Users\Admin\AppData\Local\Temp\659add09ffc62a07b044a31d8b0df624.exe2⤵PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\659add09ffc62a07b044a31d8b0df624.exeC:\Users\Admin\AppData\Local\Temp\659add09ffc62a07b044a31d8b0df624.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:912
-