General

  • Target

    e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764.zip

  • Size

    52KB

  • Sample

    240709-hwcljatgra

  • MD5

    6def0b2dddde3d345687230830688ac5

  • SHA1

    84bc7dfb5f3d048ea0bdb39f74023bfae60c1a31

  • SHA256

    9bc918be8700644cb1d01a2137c741ea22dc372f99e09ac3b4eebe1493f6852b

  • SHA512

    a5bfa49a95676049ebf7a1f8132cf51c1d1d567454311f808802155057756e34a363f2be89d8e21ba5ae4764319faf79d34611ea0121aae52e973a95cfe75118

  • SSDEEP

    1536:WZ8NR1I3XWp4y8eFZhM33+Vm1ag7EWOqrY:dNRu3XWB8eFAHKmkg8b

Malware Config

Targets

    • Target

      e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764.vbs

    • Size

      102KB

    • MD5

      b7967a2db392f9d8694734c554f06183

    • SHA1

      0386c4437465eb5bd4c6a21938e99af3c9f748c7

    • SHA256

      e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764

    • SHA512

      89223646bfb92ccf336c539f82fbab7f4e0cb35aab0779631702319504590947480338443f991500b6e3044d4d3c3cef30b45558f8382fa05e9a780426e1e8e5

    • SSDEEP

      3072:h4oGKaBSPReHzR0WAjT28fyxa+CS64B9Ou4rIQCtvvNZ:2t7SPReHd0WoT28faa+CS64mu8IQCtvn

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks