Analysis
-
max time kernel
133s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 17:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
659add09ffc62a07b044a31d8b0df624.exe
Resource
win7-20231215-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
659add09ffc62a07b044a31d8b0df624.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
659add09ffc62a07b044a31d8b0df624.exe
-
Size
677KB
-
MD5
659add09ffc62a07b044a31d8b0df624
-
SHA1
bef7500a5e3a62295f102ef5f6f100597d78a546
-
SHA256
6322ebb240ba18119193412e0ed7b325af171ec9ad48f61ce532cc120418c8d5
-
SHA512
c6e3ad0164cab67bd53cbe0ca6b797693cfe3c674eaea79a592514b81cb00fc5fddbd1ea1ec237413c980800f30d6f6d75622d678f57adde2656b219cd4de227
-
SSDEEP
12288:NR7f/bcjWlH5btCMw9eKo5yYQTgunHXa7AtKhUoYMiezxUlU:Nlf/bcqlH5bdBK3Z4qFeKlU
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
restd.xyz - Port:
587 - Username:
[email protected] - Password:
E^6666?VJo99/*
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/2628-9-0x0000000006F30000-0x0000000006FA2000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-10-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-29-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-37-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-35-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-41-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-51-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-49-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-47-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-59-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-65-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-73-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-71-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-69-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-67-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-63-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-61-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-57-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-55-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-53-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-45-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-43-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-39-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-33-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-31-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-27-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-25-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-23-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-21-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-19-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-17-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-15-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-13-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 behavioral2/memory/2628-11-0x0000000006F30000-0x0000000006F9C000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2628 set thread context of 4396 2628 659add09ffc62a07b044a31d8b0df624.exe 102 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2628 659add09ffc62a07b044a31d8b0df624.exe 2628 659add09ffc62a07b044a31d8b0df624.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2628 659add09ffc62a07b044a31d8b0df624.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4396 659add09ffc62a07b044a31d8b0df624.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2628 wrote to memory of 4396 2628 659add09ffc62a07b044a31d8b0df624.exe 102 PID 2628 wrote to memory of 4396 2628 659add09ffc62a07b044a31d8b0df624.exe 102 PID 2628 wrote to memory of 4396 2628 659add09ffc62a07b044a31d8b0df624.exe 102 PID 2628 wrote to memory of 4396 2628 659add09ffc62a07b044a31d8b0df624.exe 102 PID 2628 wrote to memory of 4396 2628 659add09ffc62a07b044a31d8b0df624.exe 102 PID 2628 wrote to memory of 4396 2628 659add09ffc62a07b044a31d8b0df624.exe 102 PID 2628 wrote to memory of 4396 2628 659add09ffc62a07b044a31d8b0df624.exe 102 PID 2628 wrote to memory of 4396 2628 659add09ffc62a07b044a31d8b0df624.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\659add09ffc62a07b044a31d8b0df624.exe"C:\Users\Admin\AppData\Local\Temp\659add09ffc62a07b044a31d8b0df624.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\659add09ffc62a07b044a31d8b0df624.exeC:\Users\Admin\AppData\Local\Temp\659add09ffc62a07b044a31d8b0df624.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:4396
-