Analysis
-
max time kernel
91s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 12:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Scan0007.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Scan0007.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Scan0007.exe
-
Size
882KB
-
MD5
535deefc0c2866703f5a24782aa5b090
-
SHA1
1065b8088c3c0a21a7b45c32b1f3b27705e17d40
-
SHA256
be7f48bc769105639774263b5a730b3960eac5fac8ba019d19a06aca81ebb946
-
SHA512
f36fac63b6ee1080eb88daf0ad3ffee9a1bb3a1b4afa02e96455b3dbd2aa8fbf7eb32055e477043a7a0363ec14ac3b43ea40260ed91afbff456894680670b5ac
-
SSDEEP
12288:QUBDMmZriMmjwc+/aOU2xglqHo9a6NWPXjPb9jgTBvY9GhOEGUAV38I:IyrY565glqI46NWPjqBvzOcAm
Score
10/10
Malware Config
Extracted
Family
blustealer
Credentials
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
%plDEKz1
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4848 set thread context of 4244 4848 Scan0007.exe 95 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4244 Scan0007.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4848 wrote to memory of 4244 4848 Scan0007.exe 95 PID 4848 wrote to memory of 4244 4848 Scan0007.exe 95 PID 4848 wrote to memory of 4244 4848 Scan0007.exe 95 PID 4848 wrote to memory of 4244 4848 Scan0007.exe 95 PID 4848 wrote to memory of 4244 4848 Scan0007.exe 95 PID 4848 wrote to memory of 4244 4848 Scan0007.exe 95 PID 4848 wrote to memory of 4244 4848 Scan0007.exe 95 PID 4848 wrote to memory of 4244 4848 Scan0007.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scan0007.exe"C:\Users\Admin\AppData\Local\Temp\Scan0007.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\Scan0007.exe"C:\Users\Admin\AppData\Local\Temp\Scan0007.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4244
-