General

  • Target

    1de20ab31a930a9f60a323ad35c4a0d670fc457cee78357d099784487bd8c9eb.exe

  • Size

    913KB

  • Sample

    240704-bj3hvswdqr

  • MD5

    811a6608bd141b5c41cceaa9d1e7ee52

  • SHA1

    63ee2d9a226ada53731204f906f5030cb6a28076

  • SHA256

    1de20ab31a930a9f60a323ad35c4a0d670fc457cee78357d099784487bd8c9eb

  • SHA512

    a27becb13d18fa4eb4c634ba2fb780505badd210fa380951948da1c9e56471649773786a2c0f35f889aa19981043f03375b10477b4b7b1fe10461dcedd8ca6cb

  • SSDEEP

    12288:fBfOreq6OBi6FVd5cw6HETDVVKmuqCsV2qpqfyl0fGXJ9BqNJowksVz:lOreq6O9FRc2xVS5WEO0fG5vq7H

Malware Config

Targets

    • Target

      1de20ab31a930a9f60a323ad35c4a0d670fc457cee78357d099784487bd8c9eb.exe

    • Size

      913KB

    • MD5

      811a6608bd141b5c41cceaa9d1e7ee52

    • SHA1

      63ee2d9a226ada53731204f906f5030cb6a28076

    • SHA256

      1de20ab31a930a9f60a323ad35c4a0d670fc457cee78357d099784487bd8c9eb

    • SHA512

      a27becb13d18fa4eb4c634ba2fb780505badd210fa380951948da1c9e56471649773786a2c0f35f889aa19981043f03375b10477b4b7b1fe10461dcedd8ca6cb

    • SSDEEP

      12288:fBfOreq6OBi6FVd5cw6HETDVVKmuqCsV2qpqfyl0fGXJ9BqNJowksVz:lOreq6O9FRc2xVS5WEO0fG5vq7H

    • Guloader,Cloudeye

      A shellcode based downloader first seen in 2020.

    • Lokibot

      Lokibot is a Password and CryptoCoin Wallet Stealer.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

System Information Discovery

1
T1082

Collection

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks