General

  • Target

    7a21e7cd0bb339b2d5533a3114ebc920

  • Size

    619KB

  • Sample

    240127-npwcysbce9

  • MD5

    7a21e7cd0bb339b2d5533a3114ebc920

  • SHA1

    46eb9f47d337920d5848e60fdebe67ef33fd884a

  • SHA256

    31ff4a9756eab5f110bd19f1250d50cca5068054e99e73068929113aaccad0bd

  • SHA512

    ef66aac8fb210fad10ff3657c27f8908b4d4cd917103bce1196a309cc6ebb33b191a81ead4201e627483b729d9768b26fd4969d0c99ef7303bfabfb9cfa45331

  • SSDEEP

    12288:9O1ovBJLNs6kBN0nm/6cXrV81GlE0ENQ1wJDroYSO14VFA9Mt:UGvWbN0/KOkE0mQ1wJfoFXAyt

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sabaint.me
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    regina1983-

Targets

    • Target

      Btc payments copy_3000 usd_________________.exe

    • Size

      915KB

    • MD5

      fa78d1d0ef30fafdb9670abc29deb24e

    • SHA1

      52b8bf6a36b6f4f74718c51c356112368110807f

    • SHA256

      80877119f9ddd3a9f4740e0b04640d3fd1793787cfb9d45cc5f23ed318828b1b

    • SHA512

      f9c96a1f2054ed926b39938594d8051ebe926044a15a3650b6fb9e9766ea50df6bcae4834381378c6959dc4489f86097863c44c5e6cdc0e28be0660e1794b1da

    • SSDEEP

      12288:1FDc9F3nC0Py3gAhgqeJbNo6CBN0bm1acX3x81GzE0ELQ1wBDrUYSi142+y:15bN0RKWgE0mQ1wBfUFy+y

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks