General

  • Target

    f1ec304e5be150aca87f071e47a5d025_JaffaCakes118

  • Size

    683KB

  • Sample

    240415-zw13kagd35

  • MD5

    f1ec304e5be150aca87f071e47a5d025

  • SHA1

    6c981d077f980958f4d5a405928eee3385545778

  • SHA256

    78a20f7c54434dd382b55ca3256778ef987ba1035d5e91c9d0d25c9d801f8add

  • SHA512

    adba0407db594918a044ab2d148975b1e4bfcf74a22f1a5b5f7a149eb491d8dc1d278593198f9898327fcf6da37b93f387b0544629a1fc2a1e330e49828ad229

  • SSDEEP

    12288:CTU+bmzUri3pwCCtfE95OJmufAW5Gn5vX4LEjYj9qfU9nAZz0fI+KvnVbnc8/FMm:C9mzp3cfFJmun4nt5kASAJ0fFKvnpnrT

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    budgetn.xyz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    r[]w2e=V+]AV

Targets

    • Target

      f1ec304e5be150aca87f071e47a5d025_JaffaCakes118

    • Size

      683KB

    • MD5

      f1ec304e5be150aca87f071e47a5d025

    • SHA1

      6c981d077f980958f4d5a405928eee3385545778

    • SHA256

      78a20f7c54434dd382b55ca3256778ef987ba1035d5e91c9d0d25c9d801f8add

    • SHA512

      adba0407db594918a044ab2d148975b1e4bfcf74a22f1a5b5f7a149eb491d8dc1d278593198f9898327fcf6da37b93f387b0544629a1fc2a1e330e49828ad229

    • SSDEEP

      12288:CTU+bmzUri3pwCCtfE95OJmufAW5Gn5vX4LEjYj9qfU9nAZz0fI+KvnVbnc8/FMm:C9mzp3cfFJmun4nt5kASAJ0fFKvnpnrT

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks