General

  • Target

    9aceea76f4ccb33286e37aa91e15cb44

  • Size

    957KB

  • Sample

    240214-fk9qsaag85

  • MD5

    9aceea76f4ccb33286e37aa91e15cb44

  • SHA1

    c01c60f47bfabda0c99f6d434e6bf772e54fa9a8

  • SHA256

    b11cb95a4f8665db55cc8a9f54cc0107d37c224adca1f3dfe9bcc50074a23cb2

  • SHA512

    b341e4b9ad1ea41119016cbda2e6a75e3c4531827553eaeaf3e92b2c5a7cac90aefcd8b525bd0be239433719229aa11a05f6b064c064759f4fd92ebf7d3c6a78

  • SSDEEP

    24576:ebb58UKrHWcxaW7lSR7BJkmjw2tjy1JiVJHPi:25+rWKaW5Stkmj381g

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.starkgulf.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    info123#

Targets

    • Target

      9aceea76f4ccb33286e37aa91e15cb44

    • Size

      957KB

    • MD5

      9aceea76f4ccb33286e37aa91e15cb44

    • SHA1

      c01c60f47bfabda0c99f6d434e6bf772e54fa9a8

    • SHA256

      b11cb95a4f8665db55cc8a9f54cc0107d37c224adca1f3dfe9bcc50074a23cb2

    • SHA512

      b341e4b9ad1ea41119016cbda2e6a75e3c4531827553eaeaf3e92b2c5a7cac90aefcd8b525bd0be239433719229aa11a05f6b064c064759f4fd92ebf7d3c6a78

    • SSDEEP

      24576:ebb58UKrHWcxaW7lSR7BJkmjw2tjy1JiVJHPi:25+rWKaW5Stkmj381g

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks