General

  • Target

    PLANT PROJECT PROPOSAL BID_24-0676·pdf.exe

  • Size

    474KB

  • Sample

    240624-nby7paygnc

  • MD5

    76e2017ac06cb371534484026354166b

  • SHA1

    675b71298410de5703fdc9bcd81b29de0ff8a326

  • SHA256

    659a432dd59291bab8b1bb3c78c3d26c8080cbb255e5407f504fe6e24f175352

  • SHA512

    edf89452e25231907695c9491bd6a442e76f6e27174386c8d2373d361022b01e2cec6a4bd0ad23a957c7794d3610be3c4a1e0dd5cdc8f343e482c0b89858298b

  • SSDEEP

    12288:EqgowvlfpMcu8jRMhrnPtwBa2BagAaOzLkef:gdfTuThBwBZaHnf

Malware Config

Targets

    • Target

      PLANT PROJECT PROPOSAL BID_24-0676·pdf.exe

    • Size

      474KB

    • MD5

      76e2017ac06cb371534484026354166b

    • SHA1

      675b71298410de5703fdc9bcd81b29de0ff8a326

    • SHA256

      659a432dd59291bab8b1bb3c78c3d26c8080cbb255e5407f504fe6e24f175352

    • SHA512

      edf89452e25231907695c9491bd6a442e76f6e27174386c8d2373d361022b01e2cec6a4bd0ad23a957c7794d3610be3c4a1e0dd5cdc8f343e482c0b89858298b

    • SSDEEP

      12288:EqgowvlfpMcu8jRMhrnPtwBa2BagAaOzLkef:gdfTuThBwBZaHnf

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • Target

      $PLUGINSDIR/Banner.dll

    • Size

      4KB

    • MD5

      843657eaf7240b695624dcf38bb0eb31

    • SHA1

      ca99a44e737fdeaab56f864ce1ef15a57d2eec90

    • SHA256

      b935d14c32ad8e16055f7f5794ac3411e601c5ac93155afc623f25b08e2ab82e

    • SHA512

      7773d9f6bbd17253d1c96ce225b2f9d3673969b38177afef236d1c5d4aabaae2c07793e07c34f0281ec3b859ae955e83bfe43a598ce7cc6c893ec8c9604f5de3

    Score
    1/10
    • Target

      $PLUGINSDIR/BgImage.dll

    • Size

      7KB

    • MD5

      a98576f0d6b35b466cb881860977fdbc

    • SHA1

      28b3dbbd76f15c876b98dce523100aa3256d193a

    • SHA256

      6cc4aadae46ee3e7f39b411ba087ec29bc10aa62b6b5b44003c934b3c51cefe2

    • SHA512

      29225bfb30e72d7d3d3571e7562b5901dbf2382af1972cc9a2be8e3bef697b9ac9e0aaac3a9bca191da827ad3cfce7f6876e8be9444663e83a7e2e86788a733c

    • SSDEEP

      96:8e70AKTIfv7QCUsthvNL85s4lk38Eb3CDfvEh8uLzqk7nLiEQjJ3KxkP:tBBfjbUA/85q3wEh8uLmqLpmP

    Score
    1/10
    • Target

      $PLUGINSDIR/nsDialogs.dll

    • Size

      9KB

    • MD5

      2c84faebfda2abe3b16fdf374df4272f

    • SHA1

      a5b0258a94e0440aefe1ef320e62e7a9a1c8bb40

    • SHA256

      72b38e4cca0af336655d55501c4ea05080baaa9921a62a2d717afe90bb801004

    • SHA512

      207164cc6914c59d9f4f3b8ae97628c544093ba6ecda9f8da351f453cd97e03be7a640264b8686b2d5e6f3c787f4df1d8a1ebc8e51fd788a97460cd981cc015e

    • SSDEEP

      96:3ip41CMj95rKhkfL5RkEdKkcxM2DjDf3GE/E9v5E9av+Yx4QndY7ndS27gA:3iujesS4HRE/K5MYxBdqn420

    Score
    3/10

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

System Information Discovery

1
T1082

Collection

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks