General

  • Target

    03202329.arcvfile..695876870.vbs

  • Size

    12KB

  • Sample

    230330-dv8v5aag95

  • MD5

    9f370a4d78e168070152cd7a62c93ea0

  • SHA1

    924a0fb8c3cfec12f34ef6f782bcd95734d36f15

  • SHA256

    a9f9baa69dd0b15747c01aa676052b3de1f173f5da7928b8816a7c8779065358

  • SHA512

    34b089925845fb69082b0f00eea3ecf6399cc7d16ca37a3b19616226f05a599d6c1629ec2db5e120f80f11913138bdb53a49a7ec000dbd667e2d0f1fa18e9c39

  • SSDEEP

    384:50SN0S20S20S20S20S20SK1y0S20SCu+JK1Q:50SN0S20S20S20S20S20SAy0S20SCu+v

Malware Config

Targets

    • Target

      03202329.arcvfile..695876870.vbs

    • Size

      12KB

    • MD5

      9f370a4d78e168070152cd7a62c93ea0

    • SHA1

      924a0fb8c3cfec12f34ef6f782bcd95734d36f15

    • SHA256

      a9f9baa69dd0b15747c01aa676052b3de1f173f5da7928b8816a7c8779065358

    • SHA512

      34b089925845fb69082b0f00eea3ecf6399cc7d16ca37a3b19616226f05a599d6c1629ec2db5e120f80f11913138bdb53a49a7ec000dbd667e2d0f1fa18e9c39

    • SSDEEP

      384:50SN0S20S20S20S20S20SK1y0S20SCu+JK1Q:50SN0S20S20S20S20S20SAy0S20SCu+v

    • Detects Grandoreiro payload

    • Grandoreiro

      Part of a group of banking trojans, targeting Spanish and Portuguese speaking countries.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

2
T1012

Tasks