MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e2c74cd730a858e1104119028b3d80e338900723485e5f8b6c02fd8eb459a998. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BluStealer


Vendor detections: 11


Intelligence 11 IOCs YARA 2 File information Comments

SHA256 hash: e2c74cd730a858e1104119028b3d80e338900723485e5f8b6c02fd8eb459a998
SHA3-384 hash: 716522e8d17ef9a5892fd609a536d9a934094faaa21afd98bf5d80b4b39b6ea13a0287c9dedc0d67c93401319a46bd75
SHA1 hash: db04c735b769df458518f959ae7eca39cfa06213
MD5 hash: 170860057f4aad06ddbeea0ca2b3f1b6
humanhash: november-november-foxtrot-september
File name:SecuriteInfo.com.Heur.24719.4239
Download: download sample
Signature BluStealer
File size:1'634'304 bytes
First seen:2023-04-26 19:29:20 UTC
Last seen:2023-05-01 14:57:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash f34d5f2d4577ed6d9ceec516c1f5a744 (48'661 x AgentTesla, 19'474 x Formbook, 12'208 x SnakeKeylogger)
ssdeep 24576:uU7taDBzgNEfeEvFTMxdzYPh1ogay/zj1weNgcHFx5MpfTjU/c7jNXPohE:uU7PNBmMxdEvogdzxzHFx+pfTgE7VPI
Threatray 17 similar samples on MalwareBazaar
TLSH T10D75AC3C29BD1727C5BAD7A58FD08427B664956B7121EE649CC3A3E60306F1229C363F
TrID 71.1% (.EXE) Generic CIL Executable (.NET, Mono, etc.) (73123/4/13)
10.2% (.EXE) Win64 Executable (generic) (10523/12/4)
6.3% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
4.3% (.EXE) Win32 Executable (generic) (4505/5/1)
2.0% (.ICL) Windows Icons Library (generic) (2059/9)
Reporter SecuriteInfoCom
Tags:BluStealer exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
289
Origin country :
FR FR
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Heur.24719.4239
Verdict:
Malicious activity
Analysis date:
2023-04-26 19:31:48 UTC
Tags:
stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Launching a process
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed
Result
Verdict:
UNKNOWN
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
BluStealer, ThunderFox Stealer, a310Logg
Detection:
malicious
Classification:
rans.spre.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates files inside the volume driver (system volume information)
Drops executable to a common third party application directory
Found malware configuration
Found potential ransomware demand text
Infects executable files (exe, dll, sys, html)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries random domain names (often used to prevent blacklisting and sinkholes)
Snort IDS alert for network traffic
Tries to download HTTP data from a sinkholed server
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected a310Logger
Yara detected BluStealer
Yara detected ThunderFox Stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 854770 Sample: SecuriteInfo.com.Heur.24719... Startdate: 26/04/2023 Architecture: WINDOWS Score: 100 37 vyome.biz 2->37 51 Tries to download HTTP data from a sinkholed server 2->51 53 Snort IDS alert for network traffic 2->53 55 Multi AV Scanner detection for domain / URL 2->55 57 13 other signatures 2->57 8 SecuriteInfo.com.Heur.24719.4239.exe 3 2->8         started        11 TieringEngineService.exe 2->11         started        14 armsvc.exe 1 2->14         started        17 16 other processes 2->17 signatures3 process4 dnsIp5 35 SecuriteInfo.com.Heur.24719.4239.exe.log, ASCII 8->35 dropped 19 SecuriteInfo.com.Heur.24719.4239.exe 1 8 8->19         started        75 Creates files inside the volume driver (system volume information) 11->75 45 oshhkdluh.biz 14->45 47 yhqqc.biz 107.6.74.76, 49757, 49764, 49777 VOXEL-DOT-NETUS United States 14->47 49 52 other IPs or domains 14->49 file6 signatures7 process8 dnsIp9 39 lpuegx.biz 19->39 41 oshhkdluh.biz 19->41 43 38 other IPs or domains 19->43 27 C:\Windows\System32\xbgmsvc.exe, PE32+ 19->27 dropped 29 C:\Windows\System32\wbengine.exe, PE32+ 19->29 dropped 31 C:\Windows\System32\wbem\WmiApSrv.exe, PE32+ 19->31 dropped 33 109 other malicious files 19->33 dropped 59 Writes to foreign memory regions 19->59 61 Allocates memory in foreign processes 19->61 63 Drops executable to a common third party application directory 19->63 67 2 other signatures 19->67 24 AppLaunch.exe 2 19->24         started        file10 65 Uses the Telegram API (likely for C&C communication) 39->65 signatures11 process12 signatures13 69 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 24->69 71 Tries to steal Mail credentials (via file / registry access) 24->71 73 Tries to harvest and steal browser information (history, passwords, etc) 24->73
Threat name:
ByteCode-MSIL.Trojan.AgentTesla
Status:
Malicious
First seen:
2023-04-26 16:45:02 UTC
File Type:
PE (.Net Exe)
Extracted files:
14
AV detection:
20 of 37 (54.05%)
Threat level:
  5/5
Result
Malware family:
blustealer
Score:
  10/10
Tags:
family:blustealer collection spyware stealer
Behaviour
Checks SCSI registry key(s)
Checks processor information in registry
Modifies data under HKEY_USERS
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Uses Volume Shadow Copy WMI provider
Uses Volume Shadow Copy service COM API
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Executes dropped EXE
Loads dropped DLL
Reads user/profile data of web browsers
BluStealer
Malware Config
C2 Extraction:
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Unpacked files
SH256 hash:
2b6bb9637f7134c2eccd8b4dc740d1445fac04710abc04f8823bce2b63042ac9
MD5 hash:
6fa615f675dd4a68b9a1d527effc5d80
SHA1 hash:
7901c4dad10c87456b8b06ec4bea3a50f822b934
SH256 hash:
2227f96668e9ab8c4956f9120724cfde1626020670f12f55343000525a9057d5
MD5 hash:
09bfee52e113e5e987f5745302407f16
SHA1 hash:
fe389dbf16dbceef238a726e9bc4aefe2730adc2
SH256 hash:
36e7bc1d2ae8d8419b0983034f5eb809a4ea0d24676ea1f8b0a7569926a0b84c
MD5 hash:
52756994e44514f825f435819cb9f4d5
SHA1 hash:
8f80c11dcfbb00c33242d2e3aa004f9e325b78e3
SH256 hash:
fc9bb9746aaa4e07944b2c1338d26ac852531a6e6c97e98f6a56202d27ff607c
MD5 hash:
d2ec533f8b40a8224d79c87c2291f943
SHA1 hash:
f305fa4c5c8525e853fbdbcf5c8cedad9ba08fd2
SH256 hash:
58d2780bac07a53fa9ef0099c386ad23c2c5b83df99e18bbcca9895f829ef5d8
MD5 hash:
3a6ac846fbf56df68c3cb61cd18c7623
SHA1 hash:
e5b7f4e47b357f330b33330663ff5739a02d442f
SH256 hash:
43827706e0e28be73c025b089f9f12e72159ed9ab6982ee24e92a6821089daa2
MD5 hash:
8ef645124f8c423fd12df53ece1c298e
SHA1 hash:
b803634da58dec2abdc1bd2accacfe3d8c81c155
SH256 hash:
bd172c87672f6531d8796769dc5c4b5178747f062301a1f06019b36a7b3dbcda
MD5 hash:
d76ad1a677f7fe78dd4a0a136999579f
SHA1 hash:
b8034dde9f6f22331184f28217e8ec659b807fb4
SH256 hash:
40c050c20d957d26b932faf690f9c2933a194aa6607220103ec798f46ac03403
MD5 hash:
c768bac25fc6f0551a11310e7caba8d5
SHA1 hash:
95f9195e959fb48277c95d1dd1c97a4edff7cb3a
SH256 hash:
e2c74cd730a858e1104119028b3d80e338900723485e5f8b6c02fd8eb459a998
MD5 hash:
170860057f4aad06ddbeea0ca2b3f1b6
SHA1 hash:
db04c735b769df458518f959ae7eca39cfa06213
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments