General
-
Target
USEN18112022J7474.vbs
-
Size
561KB
-
Sample
221121-k5l8facf55
-
MD5
c75626b024b9a58ec0f475bdc8a87eb5
-
SHA1
062971c3edf0f298063da181b0acc128c9c08623
-
SHA256
1240040c7e02e6c608d6989c4c79903969fb2bd04fa0a4778613e494bbaf8223
-
SHA512
cdc8dc82abe360ef7dbd9420ef51643ccc067d6b13b81cd52c0b29e4f846c79f27b2719e05da0567df71e80edd503dbd5b57e475dbc6a47646590d7da949e168
-
SSDEEP
192:4nhv/+HqdWHiFzfoE12S/j14ta1k0X1Pbk:eQg1Q
Static task
static1
Behavioral task
behavioral1
Sample
USEN18112022J7474.vbs
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
USEN18112022J7474.vbs
Resource
win10v2004-20221111-en
Malware Config
Extracted
https://firebasestorage.googleapis.com/v0/b/fir-3b506.appspot.com/o/dll%2Fdllnego.txt?alt=media&token=e81104ef-4af8-42d6-b5d7-265a338bccdb
Targets
-
-
Target
USEN18112022J7474.vbs
-
Size
561KB
-
MD5
c75626b024b9a58ec0f475bdc8a87eb5
-
SHA1
062971c3edf0f298063da181b0acc128c9c08623
-
SHA256
1240040c7e02e6c608d6989c4c79903969fb2bd04fa0a4778613e494bbaf8223
-
SHA512
cdc8dc82abe360ef7dbd9420ef51643ccc067d6b13b81cd52c0b29e4f846c79f27b2719e05da0567df71e80edd503dbd5b57e475dbc6a47646590d7da949e168
-
SSDEEP
192:4nhv/+HqdWHiFzfoE12S/j14ta1k0X1Pbk:eQg1Q
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-