General

  • Target

    MEDUPV843545_EXINV278.PDF.vbs

  • Size

    26KB

  • Sample

    240307-q6ywhsdg2z

  • MD5

    9c85d725803bf621f8a45680650fd841

  • SHA1

    0b8b47cb69205a89d6fac5ea156630c7732ca031

  • SHA256

    59b83a0e37ac6e046cf013616d51dff99d06d0bbbcc02b585c9cd1d1fa7e952d

  • SHA512

    4329e4da03d19106020dc8d958f96b1f3c0da082e69221f2a14be32599a30cae40df38075fd6a43ecac7001b6d61c6652130cab340e6ab02a525d42588c28e70

  • SSDEEP

    768:tIIJFMkYm8rSvWiRTcOuTgyjbpfn9FVItJpT+NYQcOudS0ttNA85WvjFSIgya3IW:KAFMk/8uvWiRgOuTgyjbpfn9FVItJpTD

Malware Config

Targets

    • Target

      MEDUPV843545_EXINV278.PDF.vbs

    • Size

      26KB

    • MD5

      9c85d725803bf621f8a45680650fd841

    • SHA1

      0b8b47cb69205a89d6fac5ea156630c7732ca031

    • SHA256

      59b83a0e37ac6e046cf013616d51dff99d06d0bbbcc02b585c9cd1d1fa7e952d

    • SHA512

      4329e4da03d19106020dc8d958f96b1f3c0da082e69221f2a14be32599a30cae40df38075fd6a43ecac7001b6d61c6652130cab340e6ab02a525d42588c28e70

    • SSDEEP

      768:tIIJFMkYm8rSvWiRTcOuTgyjbpfn9FVItJpT+NYQcOudS0ttNA85WvjFSIgya3IW:KAFMk/8uvWiRgOuTgyjbpfn9FVItJpTD

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks