General

  • Target

    Purchase order.vbe

  • Size

    13KB

  • Sample

    230328-wcb3jscc89

  • MD5

    496ff1fed502e29c071482cb102610c9

  • SHA1

    6f5687c69e8ca873e26f1ee6b10d0ac8d1bbbb90

  • SHA256

    19414e87fa7d0c6264b94810039b0465efd408d65efa70f62e9a8ec5ea8f222e

  • SHA512

    829dfd71bd579be926e6cde629916868f63d18a2a9238c5362b0785b28fa21c31551fd3b78561d8fec2409d2acf2a96cb2beb242ad877f060311388d585cf2bb

  • SSDEEP

    192:o9Al45haj3WuQYv5IdbcBoqEmeZx1zxqNklStddP93YBn/w7c0O23N/rgjKmrF:o9Z7Mvyl+NqZYNdtp30I/xmZ

Malware Config

Targets

    • Target

      Purchase order.vbe

    • Size

      13KB

    • MD5

      496ff1fed502e29c071482cb102610c9

    • SHA1

      6f5687c69e8ca873e26f1ee6b10d0ac8d1bbbb90

    • SHA256

      19414e87fa7d0c6264b94810039b0465efd408d65efa70f62e9a8ec5ea8f222e

    • SHA512

      829dfd71bd579be926e6cde629916868f63d18a2a9238c5362b0785b28fa21c31551fd3b78561d8fec2409d2acf2a96cb2beb242ad877f060311388d585cf2bb

    • SSDEEP

      192:o9Al45haj3WuQYv5IdbcBoqEmeZx1zxqNklStddP93YBn/w7c0O23N/rgjKmrF:o9Z7Mvyl+NqZYNdtp30I/xmZ

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks