General

  • Target

    FpsBooster+Graphicsoptimize.bat

  • Size

    968KB

  • Sample

    230616-zrqq2agc9x

  • MD5

    e00705b9d0c35b516a67dae6e07d84be

  • SHA1

    ce8bdef78acf013674990a24c81984bcd74aaaf8

  • SHA256

    0024b2cef968260b9903796d03f48ab7b4a50910c4b9af9a3441c144c04071e1

  • SHA512

    71e700d2001f24683f6d685fa3349cc03f776d076351e22f3064c240a79f309180a118571bc30f10bb543bef4a1ae7b051891cf13108a14d156a99f0e5af42ea

  • SSDEEP

    768:9h6iJGPKRTQyv58VDlMhofB7X/DvkCnHfumzn2SVB:bmPKRTxv5gDlKopXoS2K2Sr

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://discord.com/api/webhooks/1119236643715551352/ZWq4_X5KEJF0wIoYwa36iTqAQDD4P_Z7M8Ugu_VIC9W_y-1GUf-JyWDOjo6TpgCADS25

Targets

    • Target

      FpsBooster+Graphicsoptimize.bat

    • Size

      968KB

    • MD5

      e00705b9d0c35b516a67dae6e07d84be

    • SHA1

      ce8bdef78acf013674990a24c81984bcd74aaaf8

    • SHA256

      0024b2cef968260b9903796d03f48ab7b4a50910c4b9af9a3441c144c04071e1

    • SHA512

      71e700d2001f24683f6d685fa3349cc03f776d076351e22f3064c240a79f309180a118571bc30f10bb543bef4a1ae7b051891cf13108a14d156a99f0e5af42ea

    • SSDEEP

      768:9h6iJGPKRTQyv58VDlMhofB7X/DvkCnHfumzn2SVB:bmPKRTxv5gDlKopXoS2K2Sr

    Score
    10/10
    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks