General
-
Target
Inquiry for Sincola Machinery Co.,Ltd.js
-
Size
9KB
-
Sample
221123-rq95aacc8s
-
MD5
a68eba24491346cf7c631847bc7cc3f3
-
SHA1
53fa80c29e51aefdfb28c1613185b9e024970d55
-
SHA256
a4ab80049941f79e310e791e0f26108f9c5105ebef9731c9942074f395324d75
-
SHA512
dba9333613f3c10fb0111e766b90c5334fc36ad8faa0d987b83f9be246aa134642d472ba6142a6dec83d62a94610f9f68fed9777825809d000272a2d2b79d54d
-
SSDEEP
192:g0vh7Qc0FMeu/pHnep/puk7vo4fcf1J08wVLheo4FbLlhssH1UPkOcX9tXZWwcZ4:gadr0yeu/pHnep/puk7g4Ef12VjSLbpD
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry for Sincola Machinery Co.,Ltd.js
Resource
win7-20220812-en
Malware Config
Extracted
formbook
tpd2
P83Fr0F3A2KiI+cW
Pp1caIMEnr/EFk6Eu415Y1M=
O5eVsiutrsnUK6kDF6El
wxvn/yutO1JimCRM5HI=
F+ahRJCkyfI4Xwoe
ozU8V7MKMIba4U98/3w=
b4GDF1u0P2p62t1Ka3o=
KomBjwSImCdhtq7eMmQ=
1zqJLbw2x46Z8Q==
lal5nLUpt9Fjqeo=
yifkCkmeS5Of5dXwSWlkCIsXZA==
fK2zUmVxp/I6q91Ka3o=
MQa3V3RrSpKT
TzYGjdgculPW3Qs+6XM=
dVgMubs7KzuD6A==
CSAuug6iPk1Wn5K/8lQ9mQ==
hBOyTXIs6TuX612tLW0=
onmqz912c5So4uYW
zLHGWnnDYrHrLixltY15Y1M=
9wcJlsgDO4rnN2F+tY15Y1M=
u6t5GSv2GGq1591Ka3o=
YDs/5/8DghhpvOcagaEbBcBm8OYltSA=
PNt+B0tTa5SW77DC8lQ9mQ==
HqGr0fWEhxdRu52923QYk0oucj2N
78HKWHK6QVxzgrbgUw==
9cu4VJaZ0XPDFtAHNrxwCIsXZA==
O6gef4nJedFXnOA=
p1saM0DYA6Q4Xwoe
a0cGpN7R1NjmS7bSPO2dDa2Cn0+U
oLJ6jMNSYrrGKdn4RteQs01r
yY8YO0BW0+LqbbrOTY15Y1M=
GyMtxwtdELICXY+vS415Y1M=
9uhcBqhUDcI/Dp2mRA==
9tgMJWFrSpKT
8g0nudUr2C9tgrbgUw==
tMvpjsoUr0aWFE22LLwy
NA0Qp7fSft1mt/M=
+Ylf+ilHGDoAHpylRA==
wCP/FloiUPwtsrkuXnA=
pHloAjQ9cp+u9WnjE6Mbj1s=
X6l0nMVPahRVtLfoUX0F7QUlxqoU4zk=
9FkhQo0av+LgPXecwI15Y1M=
jfbJ4BacnDiYBbDg5wzFpVqrTgc=
8takLnTQTyNtq53STQ==
KQ0Hqau3g5SQ
9QEIm81TwWC19A==
oCgpCbQ1x46Z8Q==
CN2UOV8UGqQ4Xwoe
VF6PLFiYe3+X7g==
W/PHdnUJN4qS8bfUFmAokw==
GCPuBhJe+U2V/d5DP7wv
ER/0Bh2anxEhfH658lQ9mQ==
cD8t0QoUPnKCyEZ20IdRzdkucj2N
UhuqxAuZQoHULOYYXd2Qs01r
88tcXoQOCaLsUzJosDjLMgCXBuYltSA=
ug8ULIOPDaoEZV22Ttubgls=
KQvkZrg81yJngrbgUw==
hSHm/T25VSQtqfI=
z/l6IHJrSpKT
l5puib461fUHa2OP+yzp4dcB7qu+gJPCrw==
Tw3Xb5WjIME4Xwoe
Rh/yi6fCgWhswfc=
qNJIN0rvx46Z8Q==
Jr662PyHmus4Xwoe
ivcckx.hair
Targets
-
-
Target
Inquiry for Sincola Machinery Co.,Ltd.js
-
Size
9KB
-
MD5
a68eba24491346cf7c631847bc7cc3f3
-
SHA1
53fa80c29e51aefdfb28c1613185b9e024970d55
-
SHA256
a4ab80049941f79e310e791e0f26108f9c5105ebef9731c9942074f395324d75
-
SHA512
dba9333613f3c10fb0111e766b90c5334fc36ad8faa0d987b83f9be246aa134642d472ba6142a6dec83d62a94610f9f68fed9777825809d000272a2d2b79d54d
-
SSDEEP
192:g0vh7Qc0FMeu/pHnep/puk7vo4fcf1J08wVLheo4FbLlhssH1UPkOcX9tXZWwcZ4:gadr0yeu/pHnep/puk7g4Ef12VjSLbpD
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-