General

  • Target

    Solicitud De Presupuesto 09-16-2024·pdf.vbs

  • Size

    37KB

  • Sample

    240917-rdvh3axbpn

  • MD5

    2f3b50537c5d1377ac4dfd11e3b0e9da

  • SHA1

    003bd5a1d5cdc1b68ae1429e38a64a713e6ccc71

  • SHA256

    24bbc0768eee5c4f4d6c3d199295009fb24d285e8f3cec509b755de4c25e8c80

  • SHA512

    b04cf4da54fb02125bfaf4ff7b7342d47ccafc9d7073a9d97169503fd0fcc2cdff93b04de6ca1a953fa12fb842cf2a6d44d7e9ca220eb7ca50ec02b05dec2dc4

  • SSDEEP

    384:Z9vOg3rNR7SuYXMr0PAayFLPlkOCnEfA8BFg8e3StKqo/tv0yxJHqMUaYQ3K:Zp3rNhvrwgdlkXw//tK7/x7Yz

Malware Config

Targets

    • Target

      Solicitud De Presupuesto 09-16-2024·pdf.vbs

    • Size

      37KB

    • MD5

      2f3b50537c5d1377ac4dfd11e3b0e9da

    • SHA1

      003bd5a1d5cdc1b68ae1429e38a64a713e6ccc71

    • SHA256

      24bbc0768eee5c4f4d6c3d199295009fb24d285e8f3cec509b755de4c25e8c80

    • SHA512

      b04cf4da54fb02125bfaf4ff7b7342d47ccafc9d7073a9d97169503fd0fcc2cdff93b04de6ca1a953fa12fb842cf2a6d44d7e9ca220eb7ca50ec02b05dec2dc4

    • SSDEEP

      384:Z9vOg3rNR7SuYXMr0PAayFLPlkOCnEfA8BFg8e3StKqo/tv0yxJHqMUaYQ3K:Zp3rNhvrwgdlkXw//tK7/x7Yz

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks