General

  • Target

    a64609feb0d9955ae617f71141225cba

  • Size

    818KB

  • Sample

    240226-nxlhqada8x

  • MD5

    a64609feb0d9955ae617f71141225cba

  • SHA1

    b4a16cda26aad808b1206b683ebce9ec82005a07

  • SHA256

    5dabf8a97f60ebb9c51e86fc57888989511adf92cfb478c9f7a85cb152c232b2

  • SHA512

    471c68d7a9789e35255cb09dd4a407642bf655d5543d2991ff4ae8721ec97495907f71bb3fc7692368984246b372ab7ee4a5ba12304e3c259959301a3e60141a

  • SSDEEP

    12288:KfZFuKzFV3ahKIQGraTQBBZepucskf1GcdB1U03Fl89dHu:Ug63ahdqa7Qf1G4U03G0

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    budgetn.xyz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    E6uOyau@R_(Q

Targets

    • Target

      a64609feb0d9955ae617f71141225cba

    • Size

      818KB

    • MD5

      a64609feb0d9955ae617f71141225cba

    • SHA1

      b4a16cda26aad808b1206b683ebce9ec82005a07

    • SHA256

      5dabf8a97f60ebb9c51e86fc57888989511adf92cfb478c9f7a85cb152c232b2

    • SHA512

      471c68d7a9789e35255cb09dd4a407642bf655d5543d2991ff4ae8721ec97495907f71bb3fc7692368984246b372ab7ee4a5ba12304e3c259959301a3e60141a

    • SSDEEP

      12288:KfZFuKzFV3ahKIQGraTQBBZepucskf1GcdB1U03Fl89dHu:Ug63ahdqa7Qf1G4U03G0

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks