General

  • Target

    b13adc656bdc9a6425b6075e7f016debcea9cca87ccdc9faca337a03f31b4c79.vbs

  • Size

    102KB

  • Sample

    240709-cfgbwsshng

  • MD5

    01c94fd161a6999247d5f39f63bdeecf

  • SHA1

    f5da84dd0df3da70aa7cc5167d3a870aec691bd8

  • SHA256

    b13adc656bdc9a6425b6075e7f016debcea9cca87ccdc9faca337a03f31b4c79

  • SHA512

    ac62e8e35dff33dec16b4cb9faed77dbbe8e5b51d1576495d12aed0eb0ab81f92ae6af6087441e812a7ce9a102898ed4e5622e68b87c5d6b7b8d9999dd599a1d

  • SSDEEP

    3072:c4oGKaBSPReHzR0WAjT28fyxa+CS64B9Ou4rIQCtvfCS5x:pt7SPReHd0WoT28faa+CS64mu8IQCtv/

Malware Config

Targets

    • Target

      b13adc656bdc9a6425b6075e7f016debcea9cca87ccdc9faca337a03f31b4c79.vbs

    • Size

      102KB

    • MD5

      01c94fd161a6999247d5f39f63bdeecf

    • SHA1

      f5da84dd0df3da70aa7cc5167d3a870aec691bd8

    • SHA256

      b13adc656bdc9a6425b6075e7f016debcea9cca87ccdc9faca337a03f31b4c79

    • SHA512

      ac62e8e35dff33dec16b4cb9faed77dbbe8e5b51d1576495d12aed0eb0ab81f92ae6af6087441e812a7ce9a102898ed4e5622e68b87c5d6b7b8d9999dd599a1d

    • SSDEEP

      3072:c4oGKaBSPReHzR0WAjT28fyxa+CS64B9Ou4rIQCtvfCS5x:pt7SPReHd0WoT28faa+CS64mu8IQCtv/

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • Nirsoft

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks