Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
943244db3bce1498ee39206c5e0f2bbc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
943244db3bce1498ee39206c5e0f2bbc.exe
Resource
win10v2004-20231215-en
General
-
Target
943244db3bce1498ee39206c5e0f2bbc.exe
-
Size
2.7MB
-
MD5
943244db3bce1498ee39206c5e0f2bbc
-
SHA1
026cf4e2deae460e56675e827b408c17db0b16fe
-
SHA256
7257e33f527df5f7820d5dfd9022d923b5fb6cdef21d402c54fc9d3f3106f3a3
-
SHA512
c674637360aae0ea0eeafb773d6befbe5ff43ec93a0201b50731d1d4615b4701810923a5411be531914e92336b28cf43941ab06124a0e8e0cb8e58324925e7e5
-
SSDEEP
24576:KKVIwZqiBUljqRuth3CSb9F9C14mL0OIntkrUZbnLATHGK2SfRtiHbhwrDzE:LIe/a8UQrUSHGK2Sjr3E
Malware Config
Extracted
blustealer
https://api.telegram.org/bot1838876767:AAEiDKTcT_A4WBwpMo9nnrtBP7OvsmEUnNU/sendMessage?chat_id=1300181783
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/3792-9-0x0000000004F30000-0x0000000004F46000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3792 set thread context of 4984 3792 943244db3bce1498ee39206c5e0f2bbc.exe 37 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4984 943244db3bce1498ee39206c5e0f2bbc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3792 wrote to memory of 4984 3792 943244db3bce1498ee39206c5e0f2bbc.exe 37 PID 3792 wrote to memory of 4984 3792 943244db3bce1498ee39206c5e0f2bbc.exe 37 PID 3792 wrote to memory of 4984 3792 943244db3bce1498ee39206c5e0f2bbc.exe 37 PID 3792 wrote to memory of 4984 3792 943244db3bce1498ee39206c5e0f2bbc.exe 37 PID 3792 wrote to memory of 4984 3792 943244db3bce1498ee39206c5e0f2bbc.exe 37 PID 3792 wrote to memory of 4984 3792 943244db3bce1498ee39206c5e0f2bbc.exe 37 PID 3792 wrote to memory of 4984 3792 943244db3bce1498ee39206c5e0f2bbc.exe 37 PID 3792 wrote to memory of 4984 3792 943244db3bce1498ee39206c5e0f2bbc.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\943244db3bce1498ee39206c5e0f2bbc.exe"C:\Users\Admin\AppData\Local\Temp\943244db3bce1498ee39206c5e0f2bbc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\943244db3bce1498ee39206c5e0f2bbc.exe"C:\Users\Admin\AppData\Local\Temp\943244db3bce1498ee39206c5e0f2bbc.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4984
-