General

  • Target

    baae7166db2043cb130b11250b1876fe

  • Size

    1.1MB

  • Sample

    240308-gmqw5ahf61

  • MD5

    baae7166db2043cb130b11250b1876fe

  • SHA1

    149ca24cd99231bbfa9b1802ace4912f648cd5b3

  • SHA256

    3ece92463dcf24cb48108755946de3060883611669b3f54217e5600f06044883

  • SHA512

    da23c754a84aab5bc0260d6c6e14536df897dd1db1cfb5749aec120c34d1ed31576386091bec51c38d63b2501a9a3f3403d4b527e3f5c703f437de03244171ac

  • SSDEEP

    24576:FFWXykP5E3GkKJLqgam2UwVQCeYFC4W4:FFWXfoK1NamuQCecCF4

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.starkgulf.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    info123#

Targets

    • Target

      baae7166db2043cb130b11250b1876fe

    • Size

      1.1MB

    • MD5

      baae7166db2043cb130b11250b1876fe

    • SHA1

      149ca24cd99231bbfa9b1802ace4912f648cd5b3

    • SHA256

      3ece92463dcf24cb48108755946de3060883611669b3f54217e5600f06044883

    • SHA512

      da23c754a84aab5bc0260d6c6e14536df897dd1db1cfb5749aec120c34d1ed31576386091bec51c38d63b2501a9a3f3403d4b527e3f5c703f437de03244171ac

    • SSDEEP

      24576:FFWXykP5E3GkKJLqgam2UwVQCeYFC4W4:FFWXfoK1NamuQCecCF4

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks