General

  • Target

    e0dcd7f63f9be0b02afd9fef0b22dd6a

  • Size

    662KB

  • Sample

    240327-fy8qmsde32

  • MD5

    e0dcd7f63f9be0b02afd9fef0b22dd6a

  • SHA1

    a878243762b08d3a9c128c5b61fd4868a8a9880f

  • SHA256

    ee6e8afc2fea358731c1a7fbe6becfe3e1f9e4d625004802776685ad6d36566a

  • SHA512

    459c3ed6d15cfbc583daee0568c759849cf00a403b7bb3d670d9e2c7dd1a156abe10d0e4418193493043f446f221974b6ca7eecc2662d7e59b9aa3721c9b55a1

  • SSDEEP

    12288:4jXaPiEiwf12epBbK0BfYhQOYODuYnsY3shrcUURQ17B6e4:iR2f12MK0BwQODuYnsYuWQ1g

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    restd.xyz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    B~flgiHT==?g

Targets

    • Target

      e0dcd7f63f9be0b02afd9fef0b22dd6a

    • Size

      662KB

    • MD5

      e0dcd7f63f9be0b02afd9fef0b22dd6a

    • SHA1

      a878243762b08d3a9c128c5b61fd4868a8a9880f

    • SHA256

      ee6e8afc2fea358731c1a7fbe6becfe3e1f9e4d625004802776685ad6d36566a

    • SHA512

      459c3ed6d15cfbc583daee0568c759849cf00a403b7bb3d670d9e2c7dd1a156abe10d0e4418193493043f446f221974b6ca7eecc2662d7e59b9aa3721c9b55a1

    • SSDEEP

      12288:4jXaPiEiwf12epBbK0BfYhQOYODuYnsY3shrcUURQ17B6e4:iR2f12MK0BwQODuYnsYuWQ1g

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks