General
-
Target
e1d4a036b94386f0d33843622fab1bad
-
Size
1.8MB
-
Sample
240327-q9p3sade64
-
MD5
e1d4a036b94386f0d33843622fab1bad
-
SHA1
ea5e11f919586f87d34a8039afb9308b93a07f63
-
SHA256
ab7e2f3d96941792e0be9139f29d555c350123f8be701c6cd0f132c98f351407
-
SHA512
83d6c35c9524add1df097f5e66ab72f0a2e4bf818ec5ab5c9d01631a920f6cf35c88952b7ae936eaedc85ede7301ac9988ad5326cc9fd904eaeee78046b28d58
-
SSDEEP
49152:fhZUoHMjmCm6Ud+zyXc6dnS3vt05IVqCVhT6DDt:fhZUosjmCmN+mRnI+m6
Static task
static1
Behavioral task
behavioral1
Sample
e1d4a036b94386f0d33843622fab1bad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1d4a036b94386f0d33843622fab1bad.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
blustealer
Protocol: smtp- Host:
mail.dm-teh.com - Port:
587 - Username:
[email protected] - Password:
Vm@(O;CO.vEQ
Targets
-
-
Target
e1d4a036b94386f0d33843622fab1bad
-
Size
1.8MB
-
MD5
e1d4a036b94386f0d33843622fab1bad
-
SHA1
ea5e11f919586f87d34a8039afb9308b93a07f63
-
SHA256
ab7e2f3d96941792e0be9139f29d555c350123f8be701c6cd0f132c98f351407
-
SHA512
83d6c35c9524add1df097f5e66ab72f0a2e4bf818ec5ab5c9d01631a920f6cf35c88952b7ae936eaedc85ede7301ac9988ad5326cc9fd904eaeee78046b28d58
-
SSDEEP
49152:fhZUoHMjmCm6Ud+zyXc6dnS3vt05IVqCVhT6DDt:fhZUosjmCmN+mRnI+m6
Score10/10-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Suspicious use of SetThreadContext
-