

Rewterz Threat Alert – AveMaria RAT aka WarzoneRAT – Active IOCs
June 6, 2023
Rewterz Threat Alert – Mirai Botnet aka Katana – Active IOCs
June 6, 2023
Rewterz Threat Alert – AveMaria RAT aka WarzoneRAT – Active IOCs
June 6, 2023
Rewterz Threat Alert – Mirai Botnet aka Katana – Active IOCs
June 6, 2023Severity
Medium
Analysis Summary
BluStealer is a type of malware known as an Infostealer, which is designed to steal sensitive information from infected computers. BluStealer specifically targets user credentials, such as usernames and passwords, from web browsers and email clients. Once installed on a victim’s computer, BluStealer can silently gather information and send it back to the attackers who control the malware. This stolen information can be used for a variety of nefarious purposes, such as identity theft, financial fraud, and espionage.
This malware targets personal computers and goes after sensitive information such as browser credentials, FTP applications, credit card details, and personal crypto wallets highlighting the serious threat it poses to individual users.
BluStealer is typically spread through phishing emails, malicious downloads, or other forms of social engineering that trick users into downloading and installing the malware. To protect against BluStealer and other types of Info stealers, it is important to practice good cybersecurity hygiene, such as using strong passwords, keeping software up to date, and avoiding suspicious emails or downloads.
Impact
- Keystroke Logger
- Information Stealer
Indicators of Compromise
MD5
- 9c8ebe5eb36367cf02012d0664b97202
- 00ec65f5667134941484ca7ef40ef167
- 1dab5e05ac3651db47b6f881dab8dd3e
- be243e22ac3aedbbb1c9894a85e0e087
SHA-256
- 3c4bb89b988346aaae821e6b5ca65572da9e265bf00dfa5d0df0870634711545
- e0e677d03d49bc27c8575e7f2a4816aaf10cea4d624671292cce7e2eeec67497
- b445018afa2dee3bda17e65e52a7a3c143b0ae31abd00d26f58a4fa3319dd523
- 30a680695af757592455d8768df9999f4b5abb540877e652b93373fb1a693e5b
SHA-1
- e1fdfe7d35e0241eb17e501dce0586f37bef4ac7
- e2aa6f59e21c3d69fe09e036a0db32249739874a
- 66c37ab30dc83b3519815b2406cc6dd332e4d91b
- 76b0bd8ef47a8a569b205672f9700e668f6d0189
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Maintain Offline Backups – In a ransomware attack, the adversary will often delete or encrypt backups if they have access to them. That’s why it’s important to keep offline (preferably off-site), encrypted backups of data and test them regularly.
- Emails from unknown senders should always be treated with caution.
- Never trust or open ” links and attachments received from unknown sources/senders.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets