General
-
Target
6ad3ba5c57ad42f2915166df9b09417d.js
-
Size
79KB
-
Sample
231117-krzxdage36
-
MD5
6ad3ba5c57ad42f2915166df9b09417d
-
SHA1
b24e0268f97de481f65827a8604c21dfaa598839
-
SHA256
4b908a89d4b36d13f8a39f7c9d464d19b1378cd924f0e2319684fb77ffe8ff0b
-
SHA512
d8c40786019d424ae0d258d43a15788f4ad95ffe4eb12dcd132c10cbc9812f8d316257a3d16f5f8dcf235ceb22d7ee4ea1ff24beb9739039d5cb0372181b7d83
-
SSDEEP
48:/bH8kOofHb/hyWdawjJuF7ejZVt2LGLKY:/DOofcWIwjJuF7itmY
Static task
static1
Behavioral task
behavioral1
Sample
6ad3ba5c57ad42f2915166df9b09417d.js
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
6ad3ba5c57ad42f2915166df9b09417d.js
Resource
win10v2004-20231023-en
Malware Config
Targets
-
-
Target
6ad3ba5c57ad42f2915166df9b09417d.js
-
Size
79KB
-
MD5
6ad3ba5c57ad42f2915166df9b09417d
-
SHA1
b24e0268f97de481f65827a8604c21dfaa598839
-
SHA256
4b908a89d4b36d13f8a39f7c9d464d19b1378cd924f0e2319684fb77ffe8ff0b
-
SHA512
d8c40786019d424ae0d258d43a15788f4ad95ffe4eb12dcd132c10cbc9812f8d316257a3d16f5f8dcf235ceb22d7ee4ea1ff24beb9739039d5cb0372181b7d83
-
SSDEEP
48:/bH8kOofHb/hyWdawjJuF7ejZVt2LGLKY:/DOofcWIwjJuF7itmY
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Registers COM server for autorun
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-