General

  • Target

    d734f0b0f08da129c9e209e46222f5d7

  • Size

    826KB

  • Sample

    240319-1vjbsshd6v

  • MD5

    d734f0b0f08da129c9e209e46222f5d7

  • SHA1

    245154a674288f55dfb518b61bd95b0978a0eb9d

  • SHA256

    0f0e0e858c5d5f4ed136a8d27ea01a76186b22b20ba93292357b47773ebc6de5

  • SHA512

    47eddd7e4ddc8eb25d74fabe18216dd09d616a3c1ce2ed09c59092c42ce8fd401756b104e51874f2cbfa0c3760e57b213c3cc42a5a62b00ddc408357f1442161

  • SSDEEP

    12288:iPrzYMAy1m/XGkjadzOiuC4bnIerNqzUm4CfToyLBlcAPzCcl55Mx6:i4rGaadzqCmIeZBSfToucAP+ch

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    bojtai.club
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    hcx8knJINooP

Targets

    • Target

      d734f0b0f08da129c9e209e46222f5d7

    • Size

      826KB

    • MD5

      d734f0b0f08da129c9e209e46222f5d7

    • SHA1

      245154a674288f55dfb518b61bd95b0978a0eb9d

    • SHA256

      0f0e0e858c5d5f4ed136a8d27ea01a76186b22b20ba93292357b47773ebc6de5

    • SHA512

      47eddd7e4ddc8eb25d74fabe18216dd09d616a3c1ce2ed09c59092c42ce8fd401756b104e51874f2cbfa0c3760e57b213c3cc42a5a62b00ddc408357f1442161

    • SSDEEP

      12288:iPrzYMAy1m/XGkjadzOiuC4bnIerNqzUm4CfToyLBlcAPzCcl55Mx6:i4rGaadzqCmIeZBSfToucAP+ch

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks