Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
67e35ba1e64e085fe1226951b88517dc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67e35ba1e64e085fe1226951b88517dc.exe
Resource
win10v2004-20231215-en
General
-
Target
67e35ba1e64e085fe1226951b88517dc.exe
-
Size
651KB
-
MD5
67e35ba1e64e085fe1226951b88517dc
-
SHA1
42252dafdea79b21ff6385715b66fe23ef82680f
-
SHA256
65eeb38ef21735b46b448ba2359cdf12a9f5041e8f0df7385f63be59760bc645
-
SHA512
a6cf53d8d53e8fc2a27834bc63172ac5ffda94f02a3ef3dd0fca235f5f5c930c2271d0bd0ecf810694ea58b3ac1dbd0b72fe46dbe2b249c08f62b6ca0459f614
-
SSDEEP
12288:1gTXomEQUwTNl1v3iWo6GPU5WJg7MPW/hrJAmNZ5DD1ovdmKNxQVvnKb0u:1KE2pzXo6GJw9/h1AmNzRoEKnQBKw
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
bojtai.xyz - Port:
587 - Username:
[email protected] - Password:
(mr.GT^Eg#C6
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/1508-11-0x00000000083B0000-0x000000000841C000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-12-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-13-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-15-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-19-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-17-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-21-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-23-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-25-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-27-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-29-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-31-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-33-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-35-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-37-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-39-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-41-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-43-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-45-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-47-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-49-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-51-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-53-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-55-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-57-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-59-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-61-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-63-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-65-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-67-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-69-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-71-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-73-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 behavioral2/memory/1508-75-0x00000000083B0000-0x0000000008416000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\chrom = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\chrome\\chrom.exe\"" 67e35ba1e64e085fe1226951b88517dc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1508 set thread context of 4220 1508 67e35ba1e64e085fe1226951b88517dc.exe 101 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe 1508 67e35ba1e64e085fe1226951b88517dc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1508 67e35ba1e64e085fe1226951b88517dc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4220 67e35ba1e64e085fe1226951b88517dc.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4524 1508 67e35ba1e64e085fe1226951b88517dc.exe 98 PID 1508 wrote to memory of 4524 1508 67e35ba1e64e085fe1226951b88517dc.exe 98 PID 1508 wrote to memory of 4524 1508 67e35ba1e64e085fe1226951b88517dc.exe 98 PID 1508 wrote to memory of 2700 1508 67e35ba1e64e085fe1226951b88517dc.exe 99 PID 1508 wrote to memory of 2700 1508 67e35ba1e64e085fe1226951b88517dc.exe 99 PID 1508 wrote to memory of 2700 1508 67e35ba1e64e085fe1226951b88517dc.exe 99 PID 1508 wrote to memory of 3540 1508 67e35ba1e64e085fe1226951b88517dc.exe 100 PID 1508 wrote to memory of 3540 1508 67e35ba1e64e085fe1226951b88517dc.exe 100 PID 1508 wrote to memory of 3540 1508 67e35ba1e64e085fe1226951b88517dc.exe 100 PID 1508 wrote to memory of 4220 1508 67e35ba1e64e085fe1226951b88517dc.exe 101 PID 1508 wrote to memory of 4220 1508 67e35ba1e64e085fe1226951b88517dc.exe 101 PID 1508 wrote to memory of 4220 1508 67e35ba1e64e085fe1226951b88517dc.exe 101 PID 1508 wrote to memory of 4220 1508 67e35ba1e64e085fe1226951b88517dc.exe 101 PID 1508 wrote to memory of 4220 1508 67e35ba1e64e085fe1226951b88517dc.exe 101 PID 1508 wrote to memory of 4220 1508 67e35ba1e64e085fe1226951b88517dc.exe 101 PID 1508 wrote to memory of 4220 1508 67e35ba1e64e085fe1226951b88517dc.exe 101 PID 1508 wrote to memory of 4220 1508 67e35ba1e64e085fe1226951b88517dc.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe"C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exeC:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe2⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exeC:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe2⤵PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exeC:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe2⤵PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exeC:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:4220
-