General
-
Target
Solicitud De Presupuesto 09-16-2024·pdf.vbs
-
Size
37KB
-
Sample
240917-rdvh3axbpn
-
MD5
2f3b50537c5d1377ac4dfd11e3b0e9da
-
SHA1
003bd5a1d5cdc1b68ae1429e38a64a713e6ccc71
-
SHA256
24bbc0768eee5c4f4d6c3d199295009fb24d285e8f3cec509b755de4c25e8c80
-
SHA512
b04cf4da54fb02125bfaf4ff7b7342d47ccafc9d7073a9d97169503fd0fcc2cdff93b04de6ca1a953fa12fb842cf2a6d44d7e9ca220eb7ca50ec02b05dec2dc4
-
SSDEEP
384:Z9vOg3rNR7SuYXMr0PAayFLPlkOCnEfA8BFg8e3StKqo/tv0yxJHqMUaYQ3K:Zp3rNhvrwgdlkXw//tK7/x7Yz
Static task
static1
Behavioral task
behavioral1
Sample
Solicitud De Presupuesto 09-16-2024·pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Solicitud De Presupuesto 09-16-2024·pdf.vbs
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Solicitud De Presupuesto 09-16-2024·pdf.vbs
-
Size
37KB
-
MD5
2f3b50537c5d1377ac4dfd11e3b0e9da
-
SHA1
003bd5a1d5cdc1b68ae1429e38a64a713e6ccc71
-
SHA256
24bbc0768eee5c4f4d6c3d199295009fb24d285e8f3cec509b755de4c25e8c80
-
SHA512
b04cf4da54fb02125bfaf4ff7b7342d47ccafc9d7073a9d97169503fd0fcc2cdff93b04de6ca1a953fa12fb842cf2a6d44d7e9ca220eb7ca50ec02b05dec2dc4
-
SSDEEP
384:Z9vOg3rNR7SuYXMr0PAayFLPlkOCnEfA8BFg8e3StKqo/tv0yxJHqMUaYQ3K:Zp3rNhvrwgdlkXw//tK7/x7Yz
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-