Today’s diary is a quick post of an Astaroth (Guildma) malware infection I generated early on Wednesday 2022-02-16 from a malicious email targeting a Brazil-based recipient on Tuesday 2022-02-15.
Images from the infection
Shown above: Screenshot from the email that kicked off the infection.
Shown above: Downloading a zip archive after clicking link in the email.
Shown above: Content of the downloaded zip archive is a text-based .cmd file.
Shown above: Two shortcuts in the Windows Start Menu Startup folder keep this infection persistent.
Shown above: Files used for the Astaroth (Guildma) infection.
Shown above: Traffic from the infection filtered in Wireshark.
A packet capture (pcap) of the Astaroth infection traffic with the associated email and malware/artifacts are here.
brad [at] malware-traffic-analysis.net
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.