General
-
Target
DTQ112.js
-
Size
383KB
-
Sample
230119-p6xssaga29
-
MD5
85645d678a8f223d8f51b378d1be3dd7
-
SHA1
0c74da21bca5af61794c8ed4ecc2e184238b33f5
-
SHA256
e97df359d8f26fcd593a5316e33cb9e683cf837cd84eca3c7e9f8a70e055885d
-
SHA512
6b09e33c62bf92058d59d61d6c6a5c066d6e045247dd0122174eff287c367b35ccc537f213f6b9959ffa61f7531c8cba046266b238a94ff43523286640f3ea5c
-
SSDEEP
6144:rI7O6VBbM1UcEHy5rqRs23QfpbX90vXdfPFhxAVSCE4:GcH5rqyIi90PdHFhxw1E4
Static task
static1
Behavioral task
behavioral1
Sample
DTQ112.js
Resource
win7-20221111-en
Malware Config
Targets
-
-
Target
DTQ112.js
-
Size
383KB
-
MD5
85645d678a8f223d8f51b378d1be3dd7
-
SHA1
0c74da21bca5af61794c8ed4ecc2e184238b33f5
-
SHA256
e97df359d8f26fcd593a5316e33cb9e683cf837cd84eca3c7e9f8a70e055885d
-
SHA512
6b09e33c62bf92058d59d61d6c6a5c066d6e045247dd0122174eff287c367b35ccc537f213f6b9959ffa61f7531c8cba046266b238a94ff43523286640f3ea5c
-
SSDEEP
6144:rI7O6VBbM1UcEHy5rqRs23QfpbX90vXdfPFhxAVSCE4:GcH5rqyIi90PdHFhxw1E4
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-