General

  • Target

    7276059c9e3372eddfcd6aa0a0ab1b17

  • Size

    522KB

  • Sample

    240124-rmy8lscdf3

  • MD5

    7276059c9e3372eddfcd6aa0a0ab1b17

  • SHA1

    e94d1ace20b2def6a29545afac2e8f8edaccc4d6

  • SHA256

    de6888f1ef690aa50759f234c0182710aaa2c07abdb6d3a871f8a72e43fa19e2

  • SHA512

    237c295f707abcddbb6b04222707cc3e1e0768f25fac4f02b594031a1c0e0a6edacf229acf129291ba08a545fbd6b27aec6e21915f80cef9745a7cb4b56b1047

  • SSDEEP

    12288:mDD+nI3ELe0zyK5nffe6OD8+zwQ8O6l291vU6+u/hZZ5QhTuVdVP:aDwLptne68EjE91vOu/Xbl

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @@@@@@

Targets

    • Target

      7276059c9e3372eddfcd6aa0a0ab1b17

    • Size

      522KB

    • MD5

      7276059c9e3372eddfcd6aa0a0ab1b17

    • SHA1

      e94d1ace20b2def6a29545afac2e8f8edaccc4d6

    • SHA256

      de6888f1ef690aa50759f234c0182710aaa2c07abdb6d3a871f8a72e43fa19e2

    • SHA512

      237c295f707abcddbb6b04222707cc3e1e0768f25fac4f02b594031a1c0e0a6edacf229acf129291ba08a545fbd6b27aec6e21915f80cef9745a7cb4b56b1047

    • SSDEEP

      12288:mDD+nI3ELe0zyK5nffe6OD8+zwQ8O6l291vU6+u/hZZ5QhTuVdVP:aDwLptne68EjE91vOu/Xbl

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks