Resubmissions

19-03-2024 02:47

240319-c933rafe33 8

12-03-2024 07:14

240312-h2m98abc9z 10

General

  • Target

    DRAFT BILL OF LADING.PDF.vbs

  • Size

    27KB

  • Sample

    240312-h2m98abc9z

  • MD5

    8ce482c332e9ec80d47c64edc65b6a70

  • SHA1

    c4ceaf9bf0791068f650f28674f09ac345bdc3cd

  • SHA256

    1562364a3048ef8e00720e3bc0c6588ed7a4d8f560c5bdafa5b19503e159a8a8

  • SHA512

    3471397b056c668363b309fa26374a849e02b3a191a0f4a1ac33f723e8358fda9911faadd9927f65f424e974a3ab6f2c88406bb4880ce88155ab172465126886

  • SSDEEP

    768:4OMHs3w3rf5xGsmKQblBW2MQK/fFXSiP10E:403w3rDTpQZjOSiPD

Malware Config

Targets

    • Target

      DRAFT BILL OF LADING.PDF.vbs

    • Size

      27KB

    • MD5

      8ce482c332e9ec80d47c64edc65b6a70

    • SHA1

      c4ceaf9bf0791068f650f28674f09ac345bdc3cd

    • SHA256

      1562364a3048ef8e00720e3bc0c6588ed7a4d8f560c5bdafa5b19503e159a8a8

    • SHA512

      3471397b056c668363b309fa26374a849e02b3a191a0f4a1ac33f723e8358fda9911faadd9927f65f424e974a3ab6f2c88406bb4880ce88155ab172465126886

    • SSDEEP

      768:4OMHs3w3rf5xGsmKQblBW2MQK/fFXSiP10E:403w3rDTpQZjOSiPD

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks