General

  • Target

    Happy Fiestas Patrias·pdf.vbs

  • Size

    30KB

  • Sample

    240925-hdgsjazhmk

  • MD5

    a08909dd22f1ef8eee277b3f178a65bd

  • SHA1

    30d67f8107a95d9a779aa010268421d3ecddb611

  • SHA256

    eed0935d0176fbb012006f4e41de769a2ef84fcb092f06b62be7ceb250d895d9

  • SHA512

    45c195eca97a2daefd2b245548f408c5c67c991f2adcd2d08520baafd3f9e99984cab3cff52c6cdd179b314963f069ed134e32c9827a3fdf6609288ed4d9f50e

  • SSDEEP

    768:hXwI+o49dnoX82Q/YoTprXzNQvD3L8LbEjWI:SI+5LX2NoTdq83EyI

Malware Config

Targets

    • Target

      Happy Fiestas Patrias·pdf.vbs

    • Size

      30KB

    • MD5

      a08909dd22f1ef8eee277b3f178a65bd

    • SHA1

      30d67f8107a95d9a779aa010268421d3ecddb611

    • SHA256

      eed0935d0176fbb012006f4e41de769a2ef84fcb092f06b62be7ceb250d895d9

    • SHA512

      45c195eca97a2daefd2b245548f408c5c67c991f2adcd2d08520baafd3f9e99984cab3cff52c6cdd179b314963f069ed134e32c9827a3fdf6609288ed4d9f50e

    • SSDEEP

      768:hXwI+o49dnoX82Q/YoTprXzNQvD3L8LbEjWI:SI+5LX2NoTdq83EyI

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks