Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 02:41
Behavioral task
behavioral1
Sample
1072-63-0x0000000000400000-0x0000000000654000-memory.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1072-63-0x0000000000400000-0x0000000000654000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1072-63-0x0000000000400000-0x0000000000654000-memory.exe
-
Size
2.3MB
-
MD5
02002f53b909e3be9b93901c5bb570f9
-
SHA1
206884928a21249b39ce2058e4db6baf9a93ed67
-
SHA256
bf952647b085cdb60fb13dfed8948e56d642a55de80f4eb489ae3b58a38e92b6
-
SHA512
396d58a48a53da719e15df67dffb81c743032224923f64a2225bd711a556d5f8c43fff4b5d69dd3c82dbaac1aade505da3bf15ba52c1ad940f38447ab0f97b55
-
SSDEEP
12288:sWnxfgsRL4u/1AlLK6FRY2n8OPKxGvYmB:3xgsRftD0C2nKG
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2980 620 WerFault.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1072-63-0x0000000000400000-0x0000000000654000-memory.exe"C:\Users\Admin\AppData\Local\Temp\1072-63-0x0000000000400000-0x0000000000654000-memory.exe"1⤵PID:620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 620 -s 4082⤵
- Program crash
PID:2980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 620 -ip 6201⤵PID:2684