General

  • Target

    d5d26738ed73d191556fc5640b43ed39

  • Size

    743KB

  • Sample

    240319-lx8bdagh56

  • MD5

    d5d26738ed73d191556fc5640b43ed39

  • SHA1

    eaec7a86cbe18f9eb5099ca390e43562701f6d29

  • SHA256

    d254826085eaada20b9ab3803fdf88d2326ffcb2e90b36d3fbb129fce1cfed5a

  • SHA512

    475c358c8353daac6efe9212bc649ce22197d38f32e6d63543896f77d420ca50717468e32b92dd975d685ef193624ee96bcac958da6265658748ed483f454529

  • SSDEEP

    12288:I1Wl8T5+M63xjmevfUu+2EYhsJZ2uEYpplNw:IA24dx0Yrmps

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sabaint.me
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    regina1983-

Targets

    • Target

      d5d26738ed73d191556fc5640b43ed39

    • Size

      743KB

    • MD5

      d5d26738ed73d191556fc5640b43ed39

    • SHA1

      eaec7a86cbe18f9eb5099ca390e43562701f6d29

    • SHA256

      d254826085eaada20b9ab3803fdf88d2326ffcb2e90b36d3fbb129fce1cfed5a

    • SHA512

      475c358c8353daac6efe9212bc649ce22197d38f32e6d63543896f77d420ca50717468e32b92dd975d685ef193624ee96bcac958da6265658748ed483f454529

    • SSDEEP

      12288:I1Wl8T5+M63xjmevfUu+2EYhsJZ2uEYpplNw:IA24dx0Yrmps

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks