Malware Analysis Report

2024-11-15 08:48

Sample ID 220909-nrz4xsgad7
Target 9-Aug-7960986138.zip
SHA256 a45438577a1d094bf367dfc155c288b773e4aba138686410e8ef80b34a0e1010
Tags
gootloader loader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a45438577a1d094bf367dfc155c288b773e4aba138686410e8ef80b34a0e1010

Threat Level: Known bad

The file 9-Aug-7960986138.zip was found to be: Known bad.

Malicious Activity Summary

gootloader loader

GootLoader

Blocklisted process makes network request

Script User-Agent

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-09-09 11:38

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-09-09 11:38

Reported

2022-09-09 11:43

Platform

win10-20220812-en

Max time kernel

173s

Max time network

175s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\3482b8e3b2eee3a0ea5f3905fa7902074332b4077e50d86ea89a2850f7657dff.js

Signatures

GootLoader

loader gootloader

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\3482b8e3b2eee3a0ea5f3905fa7902074332b4077e50d86ea89a2850f7657dff.js

Network

Country Destination Domain Proto
NL 52.178.17.3:443 tcp
NL 178.79.208.1:80 tcp
US 8.8.8.8:53 www.lovlr.com udp
N/A 100.72.212.186:443 www.lovlr.com tcp
US 8.8.8.8:53 www.lukeamiller.net udp
N/A 100.102.98.231:443 www.lukeamiller.net tcp
US 8.8.8.8:53 www.luckies.cc udp
N/A 100.107.19.220:443 www.luckies.cc tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-09-09 11:38

Reported

2022-09-09 11:43

Platform

win10-20220901-en

Max time kernel

157s

Max time network

160s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\9f7a034bd628c5632138c460fe60e97c8889466626314f1840c12c162b50c8c4.js

Signatures

GootLoader

loader gootloader

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\9f7a034bd628c5632138c460fe60e97c8889466626314f1840c12c162b50c8c4.js

Network

Country Destination Domain Proto
US 20.42.73.27:443 tcp
NL 84.53.175.11:80 tcp
NL 149.154.167.99:443 tcp
US 8.8.8.8:53 www.macromixenlinea.com udp
N/A 100.67.67.206:443 www.macromixenlinea.com tcp
US 8.8.8.8:53 www.lovlr.com udp
N/A 100.98.158.82:443 www.lovlr.com tcp
US 8.8.8.8:53 www.lukeamiller.net udp
N/A 100.116.238.12:443 www.lukeamiller.net tcp

Files

N/A