General

  • Target

    fd4fcde280bfdd9adfd527348ef8c6f7_JaffaCakes118

  • Size

    663KB

  • Sample

    240420-wlak3see9x

  • MD5

    fd4fcde280bfdd9adfd527348ef8c6f7

  • SHA1

    c403a0886fb36aaa1cfcdc2ca7b05c7456e2e40d

  • SHA256

    b4b866e01214bc839e8505446fd3693bf59271f9925fb6ef289070339b2bf2a0

  • SHA512

    a92188fea8d02572914d5b6062a7e600f382dccfcaefdbf49f100fadfd6cfc5acef8e10f3995f4b059ac02e5b241f7362d9d57868d086b88bef87ebd54066f0c

  • SSDEEP

    12288:SqgElcxuh04SaroThlTAd6Z+1E5ngBk5UsB07mdjGRFH2CYPZw+hgl:jou/UT7TuwyE5niWUw071jWCY3gl

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    restd.club
  • Port:
    587
  • Username:
    book4@netjul.shop
  • Password:
    mQJrXsvkEb#S

Targets

    • Target

      fd4fcde280bfdd9adfd527348ef8c6f7_JaffaCakes118

    • Size

      663KB

    • MD5

      fd4fcde280bfdd9adfd527348ef8c6f7

    • SHA1

      c403a0886fb36aaa1cfcdc2ca7b05c7456e2e40d

    • SHA256

      b4b866e01214bc839e8505446fd3693bf59271f9925fb6ef289070339b2bf2a0

    • SHA512

      a92188fea8d02572914d5b6062a7e600f382dccfcaefdbf49f100fadfd6cfc5acef8e10f3995f4b059ac02e5b241f7362d9d57868d086b88bef87ebd54066f0c

    • SSDEEP

      12288:SqgElcxuh04SaroThlTAd6Z+1E5ngBk5UsB07mdjGRFH2CYPZw+hgl:jou/UT7TuwyE5niWUw071jWCY3gl

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks