General

  • Target

    444113051cce66297688bf565a9c1548b846578c39c974552bf682ab4c6179da

  • Size

    186KB

  • Sample

    231011-hs9f4agf5s

  • MD5

    6eafc14c149327e90099492a38f19563

  • SHA1

    2749d75cf4adbeb2d6a69234d25bbc4816549085

  • SHA256

    444113051cce66297688bf565a9c1548b846578c39c974552bf682ab4c6179da

  • SHA512

    24b84a02a56840acfa323f88575022f4c458ac6409de24d50762ebbf16c8684a54675f389e6f3b4a50237d84f590c1f5461b5d298d1f6f5b27137f704482d168

  • SSDEEP

    3072:EAFHdppuOf+wMSHjnywM0vY9t8Qkh+nS8Y9:tFPMOf+wMAywM0EJksnSl9

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://discord.com/api/webhooks/1145879417403494511/XvdwF1kDtpo6uVnirQlo7LEYYnolBJqCZ9jMnYemcfKqVdVQz3R6WTssixblc5eR1xY4

Extracted

Language
ps1
Source
URLs
exe.dropper

https://discord.com/api/webhooks/1145879417403494511/XvdwF1kDtpo6uVnirQlo7LEYYnolBJqCZ9jMnYemcfKqVdVQz3R6WTssixblc5eR1xY4

Targets

    • Target

      444113051cce66297688bf565a9c1548b846578c39c974552bf682ab4c6179da

    • Size

      186KB

    • MD5

      6eafc14c149327e90099492a38f19563

    • SHA1

      2749d75cf4adbeb2d6a69234d25bbc4816549085

    • SHA256

      444113051cce66297688bf565a9c1548b846578c39c974552bf682ab4c6179da

    • SHA512

      24b84a02a56840acfa323f88575022f4c458ac6409de24d50762ebbf16c8684a54675f389e6f3b4a50237d84f590c1f5461b5d298d1f6f5b27137f704482d168

    • SSDEEP

      3072:EAFHdppuOf+wMSHjnywM0vY9t8Qkh+nS8Y9:tFPMOf+wMAywM0EJksnSl9

    Score
    10/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks