General

  • Target

    211498792-115056-Gsantander-sanlccjavap0004-145pdf.vbs

  • Size

    1.4MB

  • Sample

    230317-xj791ahf27

  • MD5

    d6e064a27226da7ca5ae641311ed98f9

  • SHA1

    c2ebff65db80aa0a4e6e8f9c0be0106d64adf568

  • SHA256

    dd34e911d92a68ee7ca6eda60f0028c85ec851d38ca474945d4d6bdaed323110

  • SHA512

    d67bf936c93351e20a16179383b401f337d5e389f26d2df7fe7e933cdaa7582b5e91825083e69edf3f0887f154d67dbb65ebf157bee7d9c88a803dc0e184813d

  • SSDEEP

    24576:yizkYHX3rUHhachC2og4DQFDVhgMBvrB9laeqH:hzhX3zeCA4DQFDV5EH

Malware Config

Targets

    • Target

      211498792-115056-Gsantander-sanlccjavap0004-145pdf.vbs

    • Size

      1.4MB

    • MD5

      d6e064a27226da7ca5ae641311ed98f9

    • SHA1

      c2ebff65db80aa0a4e6e8f9c0be0106d64adf568

    • SHA256

      dd34e911d92a68ee7ca6eda60f0028c85ec851d38ca474945d4d6bdaed323110

    • SHA512

      d67bf936c93351e20a16179383b401f337d5e389f26d2df7fe7e933cdaa7582b5e91825083e69edf3f0887f154d67dbb65ebf157bee7d9c88a803dc0e184813d

    • SSDEEP

      24576:yizkYHX3rUHhachC2og4DQFDVhgMBvrB9laeqH:hzhX3zeCA4DQFDV5EH

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks