General
-
Target
d734f0b0f08da129c9e209e46222f5d7
-
Size
826KB
-
Sample
240319-1vjbsshd6v
-
MD5
d734f0b0f08da129c9e209e46222f5d7
-
SHA1
245154a674288f55dfb518b61bd95b0978a0eb9d
-
SHA256
0f0e0e858c5d5f4ed136a8d27ea01a76186b22b20ba93292357b47773ebc6de5
-
SHA512
47eddd7e4ddc8eb25d74fabe18216dd09d616a3c1ce2ed09c59092c42ce8fd401756b104e51874f2cbfa0c3760e57b213c3cc42a5a62b00ddc408357f1442161
-
SSDEEP
12288:iPrzYMAy1m/XGkjadzOiuC4bnIerNqzUm4CfToyLBlcAPzCcl55Mx6:i4rGaadzqCmIeZBSfToucAP+ch
Static task
static1
Behavioral task
behavioral1
Sample
d734f0b0f08da129c9e209e46222f5d7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d734f0b0f08da129c9e209e46222f5d7.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
bojtai.club - Port:
587 - Username:
[email protected] - Password:
hcx8knJINooP
Targets
-
-
Target
d734f0b0f08da129c9e209e46222f5d7
-
Size
826KB
-
MD5
d734f0b0f08da129c9e209e46222f5d7
-
SHA1
245154a674288f55dfb518b61bd95b0978a0eb9d
-
SHA256
0f0e0e858c5d5f4ed136a8d27ea01a76186b22b20ba93292357b47773ebc6de5
-
SHA512
47eddd7e4ddc8eb25d74fabe18216dd09d616a3c1ce2ed09c59092c42ce8fd401756b104e51874f2cbfa0c3760e57b213c3cc42a5a62b00ddc408357f1442161
-
SSDEEP
12288:iPrzYMAy1m/XGkjadzOiuC4bnIerNqzUm4CfToyLBlcAPzCcl55Mx6:i4rGaadzqCmIeZBSfToucAP+ch
Score10/10-
Detect ZGRat V1
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-