BLISTER Loader — Elastic Security Labs
Tags
Common Information
Type | Value |
---|---|
UUID | fe054eae-954f-4e28-aa41-1e0bc162fa4b |
Fingerprint | b94033b9aeace48b |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | April 13, 2023, midnight |
Added to db | Nov. 20, 2023, 12:58 a.m. |
Last updated | Nov. 17, 2024, 6:55 p.m. |
Headline | BLISTER Loader |
Title | BLISTER Loader — Elastic Security Labs |
Detected Hints/Tags/Attributes | 61/2/24 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://www.elastic.co/security-labs/blister-loader |
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 306 | ✔ | Elastic Security Labs | https://www.elastic.co/security-labs/rss/feed.xml | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 101 | www.elastic.co |
|
Details | Domain | 58 | redcanary.com |
|
Details | File | 14 | dxgi.dll |
|
Details | File | 1 | wiaaut.dll |
|
Details | File | 1 | powercpl.dll |
|
Details | File | 2 | wimgapi.dll |
|
Details | File | 2 | rdpencom.dll |
|
Details | File | 12 | colorui.dll |
|
Details | File | 2 | termmgr.dll |
|
Details | File | 40 | libcef.dll |
|
Details | File | 1 | cewmdm.dll |
|
Details | File | 1 | intl.dll |
|
Details | File | 1 | vidreszr.dll |
|
Details | File | 1 | sppcommdlg.dll |
|
Details | File | 1018 | rundll32.exe |
|
Details | File | 1 | blister.dll |
|
Details | File | 1 | c:\system32\rundll32.exe |
|
Details | File | 81 | werfault.exe |
|
Details | File | 2 | thwarting-loaders-from-socgholish-to-blisters-lockbit-payload.html |
|
Details | sha256 | 2 | afb77617a4ca637614c429440c78da438e190dd1ca24dc78483aa731d80832c2 |
|
Details | Url | 1 | https://www.elastic.co/blog/elastic-security-uncovers-blister-malware-campaign |
|
Details | Url | 1 | https://www.trendmicro.com/en_us/research/22/d/thwarting-loaders-from-socgholish-to-blisters-lockbit-payload.html |
|
Details | Url | 1 | https://redcanary.com/threat-detection-report/threats/socgholish |
|
Details | Yara rule | 1 | rule Windows_Trojan_BLISTER { meta: Author = "Elastic Security" creation_date = "2022-04-29" last_modified = "2022-04-29" os = "Windows" arch = "x86" category_type = "Trojan" family = "BLISTER" threat_name = "Windows.Trojan.BLISTER" description = "Detects BLISTER loader." reference_sample = "afb77617a4ca637614c429440c78da438e190dd1ca24dc78483aa731d80832c2" strings: $a1 = { 8D 45 DC 89 5D EC 50 6A 04 8D 45 F0 50 8D 45 EC 50 6A FF FF D7 } $a2 = { 75 F7 39 4D FC 0F 85 F3 00 00 00 64 A1 30 00 00 00 53 57 89 75 } $a3 = { 78 03 C3 8B 48 20 8B 50 1C 03 CB 8B 78 24 03 D3 8B 40 18 03 FB 89 4D F8 89 55 E0 89 45 E4 85 C0 74 3E 8B 09 8B D6 03 CB 8A 01 84 C0 74 17 C1 C2 09 0F BE C0 03 D0 41 8A 01 84 C0 75 F1 81 FA B2 17 EB 41 74 27 8B 4D F8 83 C7 02 8B 45 F4 83 C1 04 40 89 4D F8 89 45 F4 0F B7 C0 3B 45 E4 72 C2 8B FE 8B 45 04 B9 } $b1 = { 65 48 8B 04 25 60 00 00 00 44 0F B7 DB 48 8B 48 ?? 48 8B 41 ?? C7 45 48 ?? ?? ?? ?? 4C 8B 40 ?? 49 63 40 ?? } $b2 = { B9 FF FF FF 7F 89 5D 40 8B C1 44 8D 63 ?? F0 44 01 65 40 49 2B C4 75 ?? 39 4D 40 0F 85 ?? ?? ?? ?? 65 48 8B 04 25 60 00 00 00 44 0F B7 DB } condition: any of them } |