General

  • Target

    SOCSO_20230005324867·pdf.vbs

  • Size

    255KB

  • Sample

    231113-hlxhysah8w

  • MD5

    f1e7be6402e721940bddf3f1d917aaf5

  • SHA1

    6c04996641de91fc7adcf12d0791e2e9e174c856

  • SHA256

    4d102deeb0b15997e2197b8e69db45f5fe951c2b5091a5ccac7a8e26ea261652

  • SHA512

    3355c3501c262cb4cb47880abdbfdc82e7220bf02d982272bf54902526af2cf8e34faf546d4d13849822ae9c1325057eecc6088a45ee434b7c9e53d87e22347d

  • SSDEEP

    6144:jb1IJnEsovnKtPiPPL8+MOyqBT0LgPnOtwybUnmQ:f1/nKKPLJMdfwyTQ

Malware Config

Targets

    • Target

      SOCSO_20230005324867·pdf.vbs

    • Size

      255KB

    • MD5

      f1e7be6402e721940bddf3f1d917aaf5

    • SHA1

      6c04996641de91fc7adcf12d0791e2e9e174c856

    • SHA256

      4d102deeb0b15997e2197b8e69db45f5fe951c2b5091a5ccac7a8e26ea261652

    • SHA512

      3355c3501c262cb4cb47880abdbfdc82e7220bf02d982272bf54902526af2cf8e34faf546d4d13849822ae9c1325057eecc6088a45ee434b7c9e53d87e22347d

    • SSDEEP

      6144:jb1IJnEsovnKtPiPPL8+MOyqBT0LgPnOtwybUnmQ:f1/nKKPLJMdfwyTQ

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks