General

  • Target

    PO753285-R962R.vbs

  • Size

    312KB

  • Sample

    221219-p3txqafa48

  • MD5

    e78e16bb9ca9f241fa120eea2fab0835

  • SHA1

    7ed629a2188c522cec23b01ca51724cfef06161e

  • SHA256

    49ac5f8e93405000797da63ae1940247ba0d142d901b10709fadbd73f1c9e613

  • SHA512

    c60007f35d1f0103b91bf77088c04594102fe6467d0b852353a32219e43f7a53c7db02c7d163158089c536c7da5fdf31b8c5fb7367f71f9878eb32815c3ff7a2

  • SSDEEP

    6144:BRwW1rIERcrf7hHMvgNfmkDQYG6uDSqpaxtD+6t5t53GX:BRLrI8cT7hHMvCOkD9GMqpa/6X

Score
10/10

Malware Config

Targets

    • Target

      PO753285-R962R.vbs

    • Size

      312KB

    • MD5

      e78e16bb9ca9f241fa120eea2fab0835

    • SHA1

      7ed629a2188c522cec23b01ca51724cfef06161e

    • SHA256

      49ac5f8e93405000797da63ae1940247ba0d142d901b10709fadbd73f1c9e613

    • SHA512

      c60007f35d1f0103b91bf77088c04594102fe6467d0b852353a32219e43f7a53c7db02c7d163158089c536c7da5fdf31b8c5fb7367f71f9878eb32815c3ff7a2

    • SSDEEP

      6144:BRwW1rIERcrf7hHMvgNfmkDQYG6uDSqpaxtD+6t5t53GX:BRLrI8cT7hHMvCOkD9GMqpa/6X

    Score
    10/10
    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks