General

  • Target

    6a07df8810ab9c4141ad36279d406b96

  • Size

    661KB

  • Sample

    240120-k3hggaffe5

  • MD5

    6a07df8810ab9c4141ad36279d406b96

  • SHA1

    dfb0108fdc4ccb0fb10090a51ef1685f6efc0b53

  • SHA256

    b6df7c082c500ca77f9530f0b6954d6d8d997ff3565bd2be5f18d3363d50d7e0

  • SHA512

    fd0f343b531adc7374c2963f3dd4abea9006f06130c5883a75129046d5883db573194e93f92f98df9458fbf8255ffdb31b2f8f8115cd37b6398626fe5e9dfc48

  • SSDEEP

    12288:bUQDjg+65t+UW19qnOVPLQz3qeeitZJ9xrhNgL+H6IBOjwPeMK:bnyWPxVPLlzI1rhqyJUWeM

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    bojtai.xyz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    (mr.GT^Eg#C6

Targets

    • Target

      6a07df8810ab9c4141ad36279d406b96

    • Size

      661KB

    • MD5

      6a07df8810ab9c4141ad36279d406b96

    • SHA1

      dfb0108fdc4ccb0fb10090a51ef1685f6efc0b53

    • SHA256

      b6df7c082c500ca77f9530f0b6954d6d8d997ff3565bd2be5f18d3363d50d7e0

    • SHA512

      fd0f343b531adc7374c2963f3dd4abea9006f06130c5883a75129046d5883db573194e93f92f98df9458fbf8255ffdb31b2f8f8115cd37b6398626fe5e9dfc48

    • SSDEEP

      12288:bUQDjg+65t+UW19qnOVPLQz3qeeitZJ9xrhNgL+H6IBOjwPeMK:bnyWPxVPLlzI1rhqyJUWeM

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks