General

  • Target

    EX778415591042.vbs

  • Size

    10KB

  • Sample

    240922-fy99gatdld

  • MD5

    e54e9c9586d6eb1b032b97f5ced77204

  • SHA1

    d4ef79ae803dc0cbca9e180d9cf88cce6e8d08d7

  • SHA256

    c7cc1d7877c14667c21c56547ad84a8cd7d8def57789911a559d2a28399ae43b

  • SHA512

    7030de2b60b1cdb73bde04d83824de14c434828e050ba92e4d55a7f757453fb2567feed781cb6320b10cded7cb6630627540c2f8b8f941ce0ec039f539fd7400

  • SSDEEP

    192:PxDz2esQhSJLqvYLHHCsm1Bls6Vz06Clv5eVQzN8bzUik4JO7qI7m+:JJtSqqnHGDNCv5RzN8bzUiDJel1

Malware Config

Targets

    • Target

      EX778415591042.vbs

    • Size

      10KB

    • MD5

      e54e9c9586d6eb1b032b97f5ced77204

    • SHA1

      d4ef79ae803dc0cbca9e180d9cf88cce6e8d08d7

    • SHA256

      c7cc1d7877c14667c21c56547ad84a8cd7d8def57789911a559d2a28399ae43b

    • SHA512

      7030de2b60b1cdb73bde04d83824de14c434828e050ba92e4d55a7f757453fb2567feed781cb6320b10cded7cb6630627540c2f8b8f941ce0ec039f539fd7400

    • SSDEEP

      192:PxDz2esQhSJLqvYLHHCsm1Bls6Vz06Clv5eVQzN8bzUik4JO7qI7m+:JJtSqqnHGDNCv5RzN8bzUiDJel1

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks