General

  • Target

    a12c11f756f90c583890425f3a76a921

  • Size

    756KB

  • Sample

    240224-g78yfabh75

  • MD5

    a12c11f756f90c583890425f3a76a921

  • SHA1

    012738d0119b247d323a22391d901780033b7610

  • SHA256

    73e0d4f10e0f6d61bab433d14f75ea26392838fad4a491db5b24512055c49602

  • SHA512

    9ec1f61f625bc350cfe1423061b36b0812d97986d112eb437635754c11d5c8b855ede4c6355415bbac31449c7d031f1ba6fdb1a087498f4db1872dae6f288b59

  • SSDEEP

    12288:cr9vM3/EZrmFcutwSpsx5dC0YoTkNzi0DmW/t6giEAVZWeKlewlcatFbAS01pZAB:chvM3/ZwGsx5Bgi92thAfWLvlcYCS0dL

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    netjul.shop
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mQJrXsvkEb#S

Targets

    • Target

      a12c11f756f90c583890425f3a76a921

    • Size

      756KB

    • MD5

      a12c11f756f90c583890425f3a76a921

    • SHA1

      012738d0119b247d323a22391d901780033b7610

    • SHA256

      73e0d4f10e0f6d61bab433d14f75ea26392838fad4a491db5b24512055c49602

    • SHA512

      9ec1f61f625bc350cfe1423061b36b0812d97986d112eb437635754c11d5c8b855ede4c6355415bbac31449c7d031f1ba6fdb1a087498f4db1872dae6f288b59

    • SSDEEP

      12288:cr9vM3/EZrmFcutwSpsx5dC0YoTkNzi0DmW/t6giEAVZWeKlewlcatFbAS01pZAB:chvM3/ZwGsx5Bgi92thAfWLvlcYCS0dL

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks