General

  • Target

    Document BT24·pdf.vbs

  • Size

    40KB

  • Sample

    240916-rhvdvssamr

  • MD5

    4a2d0b73866679e24274e1b865076b68

  • SHA1

    27a1e7661d0ac80481d65487d800017df40fc722

  • SHA256

    72708400a35b43f411491296dd56b88c2e0db8a12038fb612ff35daf5f4bb120

  • SHA512

    1eb969f76451c9c73f805398dfc71af5a5e19c987045a3ceb3f4a04dd0383e3a007113112ad3f5e1d3cfdc75b2ee7e11ebc206a5661284babb896fef02edbb62

  • SSDEEP

    384:Z9vOg34aMEKBebLPolEhqoGEe9HwgKOATV7m8vlWfSty8itBzvSARIWg9aqbC+E:Zp346bz1nx78nF6MIWTJ

Malware Config

Targets

    • Target

      Document BT24·pdf.vbs

    • Size

      40KB

    • MD5

      4a2d0b73866679e24274e1b865076b68

    • SHA1

      27a1e7661d0ac80481d65487d800017df40fc722

    • SHA256

      72708400a35b43f411491296dd56b88c2e0db8a12038fb612ff35daf5f4bb120

    • SHA512

      1eb969f76451c9c73f805398dfc71af5a5e19c987045a3ceb3f4a04dd0383e3a007113112ad3f5e1d3cfdc75b2ee7e11ebc206a5661284babb896fef02edbb62

    • SSDEEP

      384:Z9vOg34aMEKBebLPolEhqoGEe9HwgKOATV7m8vlWfSty8itBzvSARIWg9aqbC+E:Zp346bz1nx78nF6MIWTJ

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks