Analysis
-
max time kernel
127s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21-01-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
6c90d471c7fa59b51f1a820b0fada9e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6c90d471c7fa59b51f1a820b0fada9e3.exe
Resource
win10v2004-20231222-en
General
-
Target
6c90d471c7fa59b51f1a820b0fada9e3.exe
-
Size
2.3MB
-
MD5
6c90d471c7fa59b51f1a820b0fada9e3
-
SHA1
b3ec13231b0bf2cd938c8edb531f6fc087bdb083
-
SHA256
fce1e5d65d8375a41cd61ec690febb3ca3d2b6745194cc7b0f54727bf48197a9
-
SHA512
11da870880f5070a477d9ae76d7ddee310c9e79c164c098a912625c166e7d06af214687b9e1cc4fe9b8345bf7e0b696f790b435467fd5a5a02d9106942cc8197
-
SSDEEP
12288:e7tckxtGtCP7svhJrXFlrO02jle+qcs2eXNPnrEdrE:e7JxUtAsvhRDZO/qcsxXN/odo
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
bojtai.xyz - Port:
587 - Username:
[email protected] - Password:
(mr.GT^Eg#C6
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2168 set thread context of 2124 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2124 vbc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2168 wrote to memory of 364 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 30 PID 2168 wrote to memory of 364 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 30 PID 2168 wrote to memory of 364 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 30 PID 2168 wrote to memory of 364 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 30 PID 2168 wrote to memory of 2124 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 32 PID 2168 wrote to memory of 2124 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 32 PID 2168 wrote to memory of 2124 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 32 PID 2168 wrote to memory of 2124 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 32 PID 2168 wrote to memory of 2124 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 32 PID 2168 wrote to memory of 2124 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 32 PID 2168 wrote to memory of 2124 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 32 PID 2168 wrote to memory of 2124 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 32 PID 2168 wrote to memory of 2124 2168 6c90d471c7fa59b51f1a820b0fada9e3.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c90d471c7fa59b51f1a820b0fada9e3.exe"C:\Users\Admin\AppData\Local\Temp\6c90d471c7fa59b51f1a820b0fada9e3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c2⤵PID:364
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2124
-