General

  • Target

    bd047836bb8805934054d02d6d4263f6

  • Size

    512KB

  • Sample

    240309-2v4headf5z

  • MD5

    bd047836bb8805934054d02d6d4263f6

  • SHA1

    235a213a7bb4fc944199ec54a04138c0c4d0150d

  • SHA256

    8fb7d7c33173d49da7907bf7bec5eea3d7d7f79ea3fef39bedf3de4b22f76987

  • SHA512

    532c65ddde7cac5d06ce54283f62625783082d2c186f24246ed24d32334a1cf0adb1e489ef027308b76c2620b8565c735a5a2d3ec0b67f4e845d91ea4e1ba634

  • SSDEEP

    12288:TKhCCCCCCCCCCCCC1g5al+tpTQTujAyfiIsdCCCCCCCCCCCCCCCCCCC/c2XvB5+5:TKnfSIT+L4M6U/QjortrtmHTdSqBV+

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.axfloo.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Ephraim2009

Targets

    • Target

      bd047836bb8805934054d02d6d4263f6

    • Size

      512KB

    • MD5

      bd047836bb8805934054d02d6d4263f6

    • SHA1

      235a213a7bb4fc944199ec54a04138c0c4d0150d

    • SHA256

      8fb7d7c33173d49da7907bf7bec5eea3d7d7f79ea3fef39bedf3de4b22f76987

    • SHA512

      532c65ddde7cac5d06ce54283f62625783082d2c186f24246ed24d32334a1cf0adb1e489ef027308b76c2620b8565c735a5a2d3ec0b67f4e845d91ea4e1ba634

    • SSDEEP

      12288:TKhCCCCCCCCCCCCC1g5al+tpTQTujAyfiIsdCCCCCCCCCCCCCCCCCCC/c2XvB5+5:TKnfSIT+L4M6U/QjortrtmHTdSqBV+

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks