General

  • Target

    BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021·pdf.exe

  • Size

    913KB

  • Sample

    240703-jhjclaxbjn

  • MD5

    811a6608bd141b5c41cceaa9d1e7ee52

  • SHA1

    63ee2d9a226ada53731204f906f5030cb6a28076

  • SHA256

    1de20ab31a930a9f60a323ad35c4a0d670fc457cee78357d099784487bd8c9eb

  • SHA512

    a27becb13d18fa4eb4c634ba2fb780505badd210fa380951948da1c9e56471649773786a2c0f35f889aa19981043f03375b10477b4b7b1fe10461dcedd8ca6cb

  • SSDEEP

    12288:fBfOreq6OBi6FVd5cw6HETDVVKmuqCsV2qpqfyl0fGXJ9BqNJowksVz:lOreq6O9FRc2xVS5WEO0fG5vq7H

Malware Config

Targets

    • Target

      BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021·pdf.exe

    • Size

      913KB

    • MD5

      811a6608bd141b5c41cceaa9d1e7ee52

    • SHA1

      63ee2d9a226ada53731204f906f5030cb6a28076

    • SHA256

      1de20ab31a930a9f60a323ad35c4a0d670fc457cee78357d099784487bd8c9eb

    • SHA512

      a27becb13d18fa4eb4c634ba2fb780505badd210fa380951948da1c9e56471649773786a2c0f35f889aa19981043f03375b10477b4b7b1fe10461dcedd8ca6cb

    • SSDEEP

      12288:fBfOreq6OBi6FVd5cw6HETDVVKmuqCsV2qpqfyl0fGXJ9BqNJowksVz:lOreq6O9FRc2xVS5WEO0fG5vq7H

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks