Resubmissions

16/11/2023, 11:23

231116-ng72sacd8t 10

15/11/2023, 13:03

231115-qavh8aah89 10

General

  • Target

    364702ebab29d8422e3612ab66ff2732d1a45153a6a969a6d09b0b341d1a6366

  • Size

    123KB

  • Sample

    231116-ng72sacd8t

  • MD5

    85df717c5f2d3f332318128b3198ea98

  • SHA1

    791a90af15fda54ed7ac363a3d3c4c9eb9ae6890

  • SHA256

    364702ebab29d8422e3612ab66ff2732d1a45153a6a969a6d09b0b341d1a6366

  • SHA512

    a6b35ea9c863c7c7b808a3369b2a11885cbe90bbf961e7108d4e9f7c6a6308058f5bbfc30aa0cbd560e66e048ea4dd05abb88167e385117356760e6aa6f2d619

  • SSDEEP

    3072:DYrkNLtOmvQEJq4wJtoyf8L+Co0WwRukhr3Y1VE2r8NCiuMh7:DY8R1vQORaHU0KRVhzTCir

Malware Config

Targets

    • Target

      Faktura_21110498774987·pdf.vbe

    • Size

      251KB

    • MD5

      c2d91d1d271983f5d3ddcc6229d572f1

    • SHA1

      42214503d23d5f889b2ca926b9b56971fe593fc2

    • SHA256

      18b75005950d9e39a1eb5ce18453e23e00ddecb2ac941967686f8a27b2db9ef9

    • SHA512

      9ba3fbd35d1d2d01815be68858d3225968bc4265f15a9fcf8430fbff38c9e024feb5dc0088fcedc7be831947f98018c4ff0e9035e1aabc64bb68abccaac8c6be

    • SSDEEP

      6144:jbMIJnEsivnLMFiPP1Yq4zCfB+GS7OjwM3aECUXmk:fMRngIP154+3wM3ruk

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • UAC bypass

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks