General

  • Target

    6ad3ba5c57ad42f2915166df9b09417d.js

  • Size

    79KB

  • Sample

    231117-krzxdage36

  • MD5

    6ad3ba5c57ad42f2915166df9b09417d

  • SHA1

    b24e0268f97de481f65827a8604c21dfaa598839

  • SHA256

    4b908a89d4b36d13f8a39f7c9d464d19b1378cd924f0e2319684fb77ffe8ff0b

  • SHA512

    d8c40786019d424ae0d258d43a15788f4ad95ffe4eb12dcd132c10cbc9812f8d316257a3d16f5f8dcf235ceb22d7ee4ea1ff24beb9739039d5cb0372181b7d83

  • SSDEEP

    48:/bH8kOofHb/hyWdawjJuF7ejZVt2LGLKY:/DOofcWIwjJuF7itmY

Score
8/10

Malware Config

Targets

    • Target

      6ad3ba5c57ad42f2915166df9b09417d.js

    • Size

      79KB

    • MD5

      6ad3ba5c57ad42f2915166df9b09417d

    • SHA1

      b24e0268f97de481f65827a8604c21dfaa598839

    • SHA256

      4b908a89d4b36d13f8a39f7c9d464d19b1378cd924f0e2319684fb77ffe8ff0b

    • SHA512

      d8c40786019d424ae0d258d43a15788f4ad95ffe4eb12dcd132c10cbc9812f8d316257a3d16f5f8dcf235ceb22d7ee4ea1ff24beb9739039d5cb0372181b7d83

    • SSDEEP

      48:/bH8kOofHb/hyWdawjJuF7ejZVt2LGLKY:/DOofcWIwjJuF7itmY

    Score
    8/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Registers COM server for autorun

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks