General

  • Target

    DIR-A_FB09948533·pdf.vbs

  • Size

    30KB

  • Sample

    240924-e3netsxarc

  • MD5

    49d5272b8014434052ef33b7c97a319d

  • SHA1

    c34b95243db9a907c89a4fa681b5d12c61005b17

  • SHA256

    1fa08709ae1b0ca4825289fdb001667fbf84708a8d54449d64fd67305e32a89f

  • SHA512

    545f3539790b517f333bc692847de515cb26f9e54effd3a0b8d45618137b9b53c6249f284ec4e187d69ef8b920293a7e5bc83cc6ba7952b1a9a0e1499f33de7a

  • SSDEEP

    384:3T7K96V92hyapNNQpMqEklVL25U/gmEim9JxH8CHsuLQSTzF4spQEtENUYkda3LM:j7Kk+5opb6LqFZdv8ia9NaJfw3

Malware Config

Targets

    • Target

      DIR-A_FB09948533·pdf.vbs

    • Size

      30KB

    • MD5

      49d5272b8014434052ef33b7c97a319d

    • SHA1

      c34b95243db9a907c89a4fa681b5d12c61005b17

    • SHA256

      1fa08709ae1b0ca4825289fdb001667fbf84708a8d54449d64fd67305e32a89f

    • SHA512

      545f3539790b517f333bc692847de515cb26f9e54effd3a0b8d45618137b9b53c6249f284ec4e187d69ef8b920293a7e5bc83cc6ba7952b1a9a0e1499f33de7a

    • SSDEEP

      384:3T7K96V92hyapNNQpMqEklVL25U/gmEim9JxH8CHsuLQSTzF4spQEtENUYkda3LM:j7Kk+5opb6LqFZdv8ia9NaJfw3

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks