General
-
Target
a64609feb0d9955ae617f71141225cba
-
Size
818KB
-
Sample
240226-nxlhqada8x
-
MD5
a64609feb0d9955ae617f71141225cba
-
SHA1
b4a16cda26aad808b1206b683ebce9ec82005a07
-
SHA256
5dabf8a97f60ebb9c51e86fc57888989511adf92cfb478c9f7a85cb152c232b2
-
SHA512
471c68d7a9789e35255cb09dd4a407642bf655d5543d2991ff4ae8721ec97495907f71bb3fc7692368984246b372ab7ee4a5ba12304e3c259959301a3e60141a
-
SSDEEP
12288:KfZFuKzFV3ahKIQGraTQBBZepucskf1GcdB1U03Fl89dHu:Ug63ahdqa7Qf1G4U03G0
Static task
static1
Behavioral task
behavioral1
Sample
a64609feb0d9955ae617f71141225cba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a64609feb0d9955ae617f71141225cba.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
budgetn.xyz - Port:
587 - Username:
[email protected] - Password:
E6uOyau@R_(Q
Targets
-
-
Target
a64609feb0d9955ae617f71141225cba
-
Size
818KB
-
MD5
a64609feb0d9955ae617f71141225cba
-
SHA1
b4a16cda26aad808b1206b683ebce9ec82005a07
-
SHA256
5dabf8a97f60ebb9c51e86fc57888989511adf92cfb478c9f7a85cb152c232b2
-
SHA512
471c68d7a9789e35255cb09dd4a407642bf655d5543d2991ff4ae8721ec97495907f71bb3fc7692368984246b372ab7ee4a5ba12304e3c259959301a3e60141a
-
SSDEEP
12288:KfZFuKzFV3ahKIQGraTQBBZepucskf1GcdB1U03Fl89dHu:Ug63ahdqa7Qf1G4U03G0
Score10/10-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-