General

  • Target

    a673b0550ad375402e1090c9b69a11f7

  • Size

    1.3MB

  • Sample

    240226-qk6z1aeh6z

  • MD5

    a673b0550ad375402e1090c9b69a11f7

  • SHA1

    96dd27b97b704edde0a8fa5b62233aa38a9268d7

  • SHA256

    14efe8b8b81235d085f30946d19abd59bf194bf59b1a8e19afc959a2a7f8d560

  • SHA512

    a275f407740dfe1df98eb95a7e590701f3bf33a24d172932bc5f16f4d3073014e311c201b8ce023611f62af7b9822036d38bd159f91093e4dcf89bcae04e0f38

  • SSDEEP

    12288:0S8aR9O0t5oMg5PaptYdNBIWDwMUxAd9PBxLhBfTIVq8sLFFtH503zktIxr8b:0JaR9k1PxdEWDrzvvUtsLFTq3zktlb

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    restd.club
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    @433u7a~IdTF

Targets

    • Target

      a673b0550ad375402e1090c9b69a11f7

    • Size

      1.3MB

    • MD5

      a673b0550ad375402e1090c9b69a11f7

    • SHA1

      96dd27b97b704edde0a8fa5b62233aa38a9268d7

    • SHA256

      14efe8b8b81235d085f30946d19abd59bf194bf59b1a8e19afc959a2a7f8d560

    • SHA512

      a275f407740dfe1df98eb95a7e590701f3bf33a24d172932bc5f16f4d3073014e311c201b8ce023611f62af7b9822036d38bd159f91093e4dcf89bcae04e0f38

    • SSDEEP

      12288:0S8aR9O0t5oMg5PaptYdNBIWDwMUxAd9PBxLhBfTIVq8sLFFtH503zktIxr8b:0JaR9k1PxdEWDrzvvUtsLFTq3zktlb

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks