General

  • Target

    e4230c844861c8285ebe2536d7d34c8febef3a12b8092db1c496911eb315a1a6

  • Size

    10KB

  • Sample

    240923-te2d4svenb

  • MD5

    51df1a2bc013083bfbe61a9da545d171

  • SHA1

    13650a7c722626d072c6200fa58c8965180d9b1d

  • SHA256

    e4230c844861c8285ebe2536d7d34c8febef3a12b8092db1c496911eb315a1a6

  • SHA512

    78d70e4e611f2a6a43e79f942897749f4db3bea2e373c0569ba8aad036b948e72948066d02e91a8722e62d50b85ec4750fc2916dbba205f1329b30cf6f1d3f19

  • SSDEEP

    192:qRiyQQxrRL4yGsAa9k2eGo3qwsNahQueKeDoyKzTZ7ow0qx9G:q0AF94XYecwsgXe0y6vs

Malware Config

Targets

    • Target

      SOLICITUD DE OFERTA_23-09-2024·pdf.vbs

    • Size

      28KB

    • MD5

      5a65706576c1c8a4021c28a4e1f4016d

    • SHA1

      1a736c96a27370ad4848e4c67b2fbda142d76a9d

    • SHA256

      8d3fcc51b8c2c9a5dbef3cb0575df9e31319492fc94ccb681cfc4ebc0dba7905

    • SHA512

      5e74c3a5d3a8cef461bdee06f57b3b869ca681733f32fcf17b09d4b214f4b3b2d76ec622038153bbc466d4cfb75ee63c2d7110574868272cbfc9f79c0b8bdfb8

    • SSDEEP

      768:PIM0cce8YsQcf6B3iYLAT1imcypq5EQUTswhWbN/v5GXr/VkvpcvSZ:PtKT1Ymp2V

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks