General

  • Target

    d72a055eebd32d10fe70ad01824d2c94.bin

  • Size

    1.6MB

  • Sample

    240321-c7pscabb8v

  • MD5

    d72a055eebd32d10fe70ad01824d2c94

  • SHA1

    7f9a5a2a7506b0597549443a15a3f2b6f551ba4a

  • SHA256

    d7a1984f2d549e8481d9430ec4012adae6c769c8672387b705b4a30795d2c512

  • SHA512

    cc41f135e6019f7c16a7eb47c9afb9dbbe2fc928dd519760a0c3f370b1dbaa37699730015d4e30cda16d694c02b74ccf06b388cb18e74eef390991890e788790

  • SSDEEP

    49152:SxzBoHM1VVcP5x/s1NifYa1hsDT3HOzmZt3:SxzBos13q/s1gAbn37P

Score
10/10

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.nbliaoyaun.com
  • Port:
    587
  • Username:
    merrylu@nbliaoyaun.com
  • Password:
    Treasure@55

Targets

    • Target

      d72a055eebd32d10fe70ad01824d2c94.bin

    • Size

      1.6MB

    • MD5

      d72a055eebd32d10fe70ad01824d2c94

    • SHA1

      7f9a5a2a7506b0597549443a15a3f2b6f551ba4a

    • SHA256

      d7a1984f2d549e8481d9430ec4012adae6c769c8672387b705b4a30795d2c512

    • SHA512

      cc41f135e6019f7c16a7eb47c9afb9dbbe2fc928dd519760a0c3f370b1dbaa37699730015d4e30cda16d694c02b74ccf06b388cb18e74eef390991890e788790

    • SSDEEP

      49152:SxzBoHM1VVcP5x/s1NifYa1hsDT3HOzmZt3:SxzBos13q/s1gAbn37P

    Score
    10/10
    • BluStealer

      A Modular information stealer written in Visual Basic.

    • CustAttr .NET packer

      Detects CustAttr .NET packer in memory.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks