Malware Analysis Report

2024-11-13 16:37

Sample ID 220913-xpcqaacbhn
Target 13-sept-2-8008026128.zip
SHA256 0006e9d0f4ed8309cb2a7191ededcfd5f361aefeadbe4079c09873be9c188190
Tags
gootloader loader
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0006e9d0f4ed8309cb2a7191ededcfd5f361aefeadbe4079c09873be9c188190

Threat Level: Known bad

The file 13-sept-2-8008026128.zip was found to be: Known bad.

Malicious Activity Summary

gootloader loader

GootLoader

Blocklisted process makes network request

Script User-Agent

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-09-13 19:01

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-09-13 19:01

Reported

2022-09-13 19:06

Platform

win10-20220812-en

Max time kernel

244s

Max time network

247s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\0e8b2922ea7ba8603f21b1d3555a9e56d24ac7b791a9b5faf100506ac039ff89.js

Signatures

GootLoader

loader gootloader

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\0e8b2922ea7ba8603f21b1d3555a9e56d24ac7b791a9b5faf100506ac039ff89.js

Network

Country Destination Domain Proto
US 20.189.173.13:443 tcp
US 209.197.3.8:80 tcp
US 8.8.8.8:53 www.macromixenlinea.com udp
N/A 100.126.2.97:443 www.macromixenlinea.com tcp
US 8.8.8.8:53 www.lovlr.com udp
N/A 100.126.58.41:443 www.lovlr.com tcp
US 8.8.8.8:53 www.lukeamiller.net udp
N/A 100.113.174.161:443 www.lukeamiller.net tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-09-13 19:01

Reported

2022-09-13 19:06

Platform

win10-20220812-en

Max time kernel

194s

Max time network

197s

Command Line

wscript.exe C:\Users\Admin\AppData\Local\Temp\244b3a104682ba299675837cbc505c69bedcb41e97be4b2832c98d92898acc5d.js

Signatures

GootLoader

loader gootloader

Blocklisted process makes network request

Description Indicator Process Target
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A
N/A N/A C:\Windows\system32\wscript.exe N/A

Script User-Agent

Description Indicator Process Target
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A
HTTP User-Agent header Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) N/A N/A

Processes

C:\Windows\system32\wscript.exe

wscript.exe C:\Users\Admin\AppData\Local\Temp\244b3a104682ba299675837cbc505c69bedcb41e97be4b2832c98d92898acc5d.js

Network

Country Destination Domain Proto
US 20.189.173.15:443 tcp
US 8.8.8.8:53 www.macromixenlinea.com udp
N/A 100.66.189.181:443 www.macromixenlinea.com tcp
US 8.8.8.8:53 www.lovlr.com udp
N/A 100.115.98.2:443 www.lovlr.com tcp
US 8.8.8.8:53 www.lukeamiller.net udp
N/A 100.121.100.194:443 www.lukeamiller.net tcp

Files

N/A