Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
b5632339a5359f451b6ad0d68b2e6cb8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5632339a5359f451b6ad0d68b2e6cb8.exe
Resource
win10v2004-20240226-en
General
-
Target
b5632339a5359f451b6ad0d68b2e6cb8.exe
-
Size
865KB
-
MD5
b5632339a5359f451b6ad0d68b2e6cb8
-
SHA1
bb37229b4be212a96773fcfa152ef9edacd9b203
-
SHA256
ad9d1d2c8db7cc0b400cd49555dc39d2c0c13fa74784f007f5177163bf480176
-
SHA512
93d73f2853038ba479e6fac47a9ebb0a9ec22a465a3ecaf3f1d002e51d3cf0dd1cc19d5e08c8c1ab46a5594e0138dce5ea513a41dbcecb64fb84513bfcc22da0
-
SSDEEP
24576:T9OTg+jR8EkHk9wZeDUJ5M5uClZXoVVmacP:kTgNE0ZiUJ5wZAVk
Malware Config
Extracted
blustealer
https://api.telegram.org/bot1816395306:AAE3ZBLYV2L9aT9mL8itL9vr3RP6nOz_B1o/sendMessage?chat_id=1368673464
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2084 set thread context of 2228 2084 b5632339a5359f451b6ad0d68b2e6cb8.exe 29 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2084 b5632339a5359f451b6ad0d68b2e6cb8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2228 svchost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2228 2084 b5632339a5359f451b6ad0d68b2e6cb8.exe 29 PID 2084 wrote to memory of 2228 2084 b5632339a5359f451b6ad0d68b2e6cb8.exe 29 PID 2084 wrote to memory of 2228 2084 b5632339a5359f451b6ad0d68b2e6cb8.exe 29 PID 2084 wrote to memory of 2228 2084 b5632339a5359f451b6ad0d68b2e6cb8.exe 29 PID 2084 wrote to memory of 2228 2084 b5632339a5359f451b6ad0d68b2e6cb8.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5632339a5359f451b6ad0d68b2e6cb8.exe"C:\Users\Admin\AppData\Local\Temp\b5632339a5359f451b6ad0d68b2e6cb8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\b5632339a5359f451b6ad0d68b2e6cb8.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2228
-