General

  • Target

    117532123_20240925-9_MCZB·pdf.vbs

  • Size

    32KB

  • Sample

    240925-ja8mhssgkl

  • MD5

    d1a211300527f936749e157497ee6bbb

  • SHA1

    c3dde8608211be1f593826d462f07aad30acfcb8

  • SHA256

    34c2a02d6f7ed81aa8a9f40ac063d1211c2c8bc4a868d76f6067c95113650e2c

  • SHA512

    41bce01d8d6f05f1eeca76a3b5ef6708b272fb9f70c2ad41da442e70f9b3b2fb9e94af846b8f837a767b4241f278efa6a35fb4bee17749c3f81176ad55cb7193

  • SSDEEP

    384:3Gd0zog59nv53rIci7Yib5Afi9SYToxbiRjH90e/:Wd0zog59B3rBu55csSmoQRN/

Malware Config

Targets

    • Target

      117532123_20240925-9_MCZB·pdf.vbs

    • Size

      32KB

    • MD5

      d1a211300527f936749e157497ee6bbb

    • SHA1

      c3dde8608211be1f593826d462f07aad30acfcb8

    • SHA256

      34c2a02d6f7ed81aa8a9f40ac063d1211c2c8bc4a868d76f6067c95113650e2c

    • SHA512

      41bce01d8d6f05f1eeca76a3b5ef6708b272fb9f70c2ad41da442e70f9b3b2fb9e94af846b8f837a767b4241f278efa6a35fb4bee17749c3f81176ad55cb7193

    • SSDEEP

      384:3Gd0zog59nv53rIci7Yib5Afi9SYToxbiRjH90e/:Wd0zog59B3rBu55csSmoQRN/

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks