General

  • Target

    LC application form.js

  • Size

    1KB

  • Sample

    230510-jlv6kagg4w

  • MD5

    e68fcb03ac21ca8b335eb9ddf9642f17

  • SHA1

    8824d6d2c27d16dcc98f9318f34b7affae3a58b1

  • SHA256

    3047d0a3ab3d9253ba224449235ca0aba29d0827b376d3d2f690c3442bdccad2

  • SHA512

    7aeb778438b0fdabc6955605e8e43097a83782e9dedc99c411f1794ef41c2479b34846d46de17ad4da6d67d0916ed466212c098248511fc1ac2d80dee20ca19a

Score
8/10

Malware Config

Targets

    • Target

      LC application form.js

    • Size

      1KB

    • MD5

      e68fcb03ac21ca8b335eb9ddf9642f17

    • SHA1

      8824d6d2c27d16dcc98f9318f34b7affae3a58b1

    • SHA256

      3047d0a3ab3d9253ba224449235ca0aba29d0827b376d3d2f690c3442bdccad2

    • SHA512

      7aeb778438b0fdabc6955605e8e43097a83782e9dedc99c411f1794ef41c2479b34846d46de17ad4da6d67d0916ed466212c098248511fc1ac2d80dee20ca19a

    Score
    8/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks