General
-
Target
e2fda069aeb3745872935ff4b9ed64ce7f40cae6b6b57a7f4bfb37a01d9178b1
-
Size
7KB
-
Sample
240905-vsw7zsweqf
-
MD5
723338c189a4c4ebd80559bc394f39b6
-
SHA1
b2b8a82f00027528e1ca25f0e5dc36d9d066064f
-
SHA256
e2fda069aeb3745872935ff4b9ed64ce7f40cae6b6b57a7f4bfb37a01d9178b1
-
SHA512
208b516aea8c4eebbf951ebf8d889f3e8414bf917e195142fd312b25425221945a0c7c70c7aee3a89bd18c7c210a9281e8810a227b279cb0f1e5aed8b7aa4a8f
-
SSDEEP
192:BghB08+khrmgIxp6Zh03CIDs/La/TYz6rxoCB:BghB08+ChIOs3Ca2/ISCB
Static task
static1
Behavioral task
behavioral1
Sample
BUDGET REQUEST (University of Brasilia) 05-09-2024.vbe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
BUDGET REQUEST (University of Brasilia) 05-09-2024.vbe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
BUDGET REQUEST (University of Brasilia) 05-09-2024.vbe
-
Size
25KB
-
MD5
3ccecc201a02a447e202b789225d485a
-
SHA1
3f862aa3bd5a63377d92bda94fde52fb6117787f
-
SHA256
5818ebc075a84b23c0e75e871bd910fa656d9f5e39f96a9e23ff15d10b4b1fad
-
SHA512
5ca42afdc12633066081134fcaea9a5fec2f4095997a62b1a80e1b7bcefa0eec1a6bc57f1f1d26907ddb3ebf5831a92fe0b64d7a4fb8620caaf7b36dbd8e29e0
-
SSDEEP
384:Vwm8rpPNSoc8/zHXzM18KL20GrPWRIdbiKiz:58C6D2Er2ozY
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-