General
-
Target
a673b0550ad375402e1090c9b69a11f7
-
Size
1.3MB
-
Sample
240226-qk6z1aeh6z
-
MD5
a673b0550ad375402e1090c9b69a11f7
-
SHA1
96dd27b97b704edde0a8fa5b62233aa38a9268d7
-
SHA256
14efe8b8b81235d085f30946d19abd59bf194bf59b1a8e19afc959a2a7f8d560
-
SHA512
a275f407740dfe1df98eb95a7e590701f3bf33a24d172932bc5f16f4d3073014e311c201b8ce023611f62af7b9822036d38bd159f91093e4dcf89bcae04e0f38
-
SSDEEP
12288:0S8aR9O0t5oMg5PaptYdNBIWDwMUxAd9PBxLhBfTIVq8sLFFtH503zktIxr8b:0JaR9k1PxdEWDrzvvUtsLFTq3zktlb
Static task
static1
Behavioral task
behavioral1
Sample
a673b0550ad375402e1090c9b69a11f7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a673b0550ad375402e1090c9b69a11f7.exe
Resource
win10v2004-20240221-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
restd.club - Port:
587 - Username:
[email protected] - Password:
@433u7a~IdTF
Targets
-
-
Target
a673b0550ad375402e1090c9b69a11f7
-
Size
1.3MB
-
MD5
a673b0550ad375402e1090c9b69a11f7
-
SHA1
96dd27b97b704edde0a8fa5b62233aa38a9268d7
-
SHA256
14efe8b8b81235d085f30946d19abd59bf194bf59b1a8e19afc959a2a7f8d560
-
SHA512
a275f407740dfe1df98eb95a7e590701f3bf33a24d172932bc5f16f4d3073014e311c201b8ce023611f62af7b9822036d38bd159f91093e4dcf89bcae04e0f38
-
SSDEEP
12288:0S8aR9O0t5oMg5PaptYdNBIWDwMUxAd9PBxLhBfTIVq8sLFFtH503zktIxr8b:0JaR9k1PxdEWDrzvvUtsLFTq3zktlb
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-