General

  • Target

    138e14ab6f482511b4965e42d0a9bd1d4bf7e97395a658b5a050a2fbd7801616.vbs

  • Size

    31KB

  • Sample

    240923-bdmkfs1hqj

  • MD5

    7a2764240a88f6ed3b5d20a27c7aed4b

  • SHA1

    82ccd89a01ddb8473af610427b8e74cc578215e1

  • SHA256

    138e14ab6f482511b4965e42d0a9bd1d4bf7e97395a658b5a050a2fbd7801616

  • SHA512

    3dde505fa49a7adab7ee3868d563a78616f87b178b999edcdb456c2a10a1c790d84a775959262e85b550b989cfa13eeb10c4dd425a6288b6354fb003d0d695f6

  • SSDEEP

    768:Zp3UoMmVOExusrjfn9O/IcH3M2BPeSgRSqQgnZSa8RKZ6PRAxMikzYAs3:ZdU8O/DNmb

Malware Config

Targets

    • Target

      138e14ab6f482511b4965e42d0a9bd1d4bf7e97395a658b5a050a2fbd7801616.vbs

    • Size

      31KB

    • MD5

      7a2764240a88f6ed3b5d20a27c7aed4b

    • SHA1

      82ccd89a01ddb8473af610427b8e74cc578215e1

    • SHA256

      138e14ab6f482511b4965e42d0a9bd1d4bf7e97395a658b5a050a2fbd7801616

    • SHA512

      3dde505fa49a7adab7ee3868d563a78616f87b178b999edcdb456c2a10a1c790d84a775959262e85b550b989cfa13eeb10c4dd425a6288b6354fb003d0d695f6

    • SSDEEP

      768:Zp3UoMmVOExusrjfn9O/IcH3M2BPeSgRSqQgnZSa8RKZ6PRAxMikzYAs3:ZdU8O/DNmb

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks