General

  • Target

    Gymnasielrere84.vbs

  • Size

    33KB

  • Sample

    240922-rcnzwsshqc

  • MD5

    0d5aa3c54f12fb3d254dc0ed6f946d2e

  • SHA1

    04d6915391bc112a8dcc482616473d21e67209ac

  • SHA256

    8b496e6f6fa5824fc7a95dc9844fdcbbb3d8abb215476ffc2e2abe0142be0447

  • SHA512

    0e416cd7f37c8266269894ac768fc57172e55685555ed2db10ed74cba0f4d64b45d3582acd1a0717f47becd23450f5aec4038434366ccdb1a2cad2524c42e9d0

  • SSDEEP

    384:Z9vOg3hVg1cC9a4pYTagc3NE7p5sUm5zSouEDfvl/7GRh/DvvxsWoutDwTK:Zp3hzC9aqYTEZUKXDfN/7GR1zxsODb

Malware Config

Targets

    • Target

      Gymnasielrere84.vbs

    • Size

      33KB

    • MD5

      0d5aa3c54f12fb3d254dc0ed6f946d2e

    • SHA1

      04d6915391bc112a8dcc482616473d21e67209ac

    • SHA256

      8b496e6f6fa5824fc7a95dc9844fdcbbb3d8abb215476ffc2e2abe0142be0447

    • SHA512

      0e416cd7f37c8266269894ac768fc57172e55685555ed2db10ed74cba0f4d64b45d3582acd1a0717f47becd23450f5aec4038434366ccdb1a2cad2524c42e9d0

    • SSDEEP

      384:Z9vOg3hVg1cC9a4pYTagc3NE7p5sUm5zSouEDfvl/7GRh/DvvxsWoutDwTK:Zp3hzC9aqYTEZUKXDfN/7GR1zxsODb

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks