General

  • Target

    New_Order_Sheet_PO N� 08072024-36556_Samples_Specifications_Request_quotations_0000800070002024.7z.zip

  • Size

    52KB

  • Sample

    240709-hzjt1ssbjk

  • MD5

    0aeb629c18d049b315694a0859f5c1df

  • SHA1

    75285de8171f14860c4744c5ab24e904dec5d67b

  • SHA256

    d651e6ff6f2398dd15f3f211dfeefac95b4cf0fe8d76a2369971b7b06b1f125b

  • SHA512

    54aada155e37218b628ce5085e3fda5e3d95af56fcb4d5c9a6367026d4a5f70c7cd2aa5556e6b635e12ac0210d66f8688c70cd9bf8367970a530eaf5ec229468

  • SSDEEP

    768:UZhHmw7iRmGImcncI7l/eacoUncB5MIcxHmzHUJld9OFPlNgshv6+jlQC/WZIn:UZhJ7vdjcI7V1tDc5mzHUFOPs4hjlQMb

Malware Config

Targets

    • Target

      New_Order_Sheet_PO N° 08072024-36556_Samples_Specifications_Request_quotations_0000800070002024.vbs

    • Size

      102KB

    • MD5

      b7967a2db392f9d8694734c554f06183

    • SHA1

      0386c4437465eb5bd4c6a21938e99af3c9f748c7

    • SHA256

      e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764

    • SHA512

      89223646bfb92ccf336c539f82fbab7f4e0cb35aab0779631702319504590947480338443f991500b6e3044d4d3c3cef30b45558f8382fa05e9a780426e1e8e5

    • SSDEEP

      3072:h4oGKaBSPReHzR0WAjT28fyxa+CS64B9Ou4rIQCtvvNZ:2t7SPReHd0WoT28faa+CS64mu8IQCtvn

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks