General

  • Target

    GBTVHWQCB_INVOICE#07JDKAS.vbs

  • Size

    4KB

  • Sample

    220223-n2axsabcen

  • MD5

    d546eb292c17626af658e34ffa402e47

  • SHA1

    f0a379ae37a860a6c082464f4a41cd474a5f4cbe

  • SHA256

    adf6d30e5c3767c268a66aa887dff2ebe4d0295c49c9bc42d343b6dd0e707825

  • SHA512

    e15402e69ca3e2391a63fec1a718524bc0841e49b0c954162696d96cd11c04d82a5daad52a5fafe1c9101922ab0cc3bd26892038d8ae4f6cd1c9220634b37048

Score
10/10

Malware Config

Extracted

Family

nworm

Version

v0.3.8

C2

nyanmoj.duckdns.org:5057

moneyhope81.duckdns.org:5057

Mutex

cb2d3cba

Targets

    • Target

      GBTVHWQCB_INVOICE#07JDKAS.vbs

    • Size

      4KB

    • MD5

      d546eb292c17626af658e34ffa402e47

    • SHA1

      f0a379ae37a860a6c082464f4a41cd474a5f4cbe

    • SHA256

      adf6d30e5c3767c268a66aa887dff2ebe4d0295c49c9bc42d343b6dd0e707825

    • SHA512

      e15402e69ca3e2391a63fec1a718524bc0841e49b0c954162696d96cd11c04d82a5daad52a5fafe1c9101922ab0cc3bd26892038d8ae4f6cd1c9220634b37048

    Score
    10/10
    • NWorm

      A TrickBot module used to propagate to vulnerable domain controllers.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks