General

  • Target

    4748877c4e4c31b6755c352c23488b4c

  • Size

    300KB

  • Sample

    240106-11qcasaeh4

  • MD5

    4748877c4e4c31b6755c352c23488b4c

  • SHA1

    0a0cda5921b28c7c95a253d6c94eef40b3226f56

  • SHA256

    11827dd777333a8deef8847d36a7070bc1732870e64d5f98cf72efe56dfe9e83

  • SHA512

    97ef01d2b9918967a00cb07466904b3da90f0919d1d9074b58d84740dca7ddcc5599d6d87d8366073798b837c4d14eea93916d3f81183f71e6fda8cbe5775071

  • SSDEEP

    6144:0Xt/0DvgNSBWaMP92QXcI0yjUTTkSP/C9XSRsOigKuhkNGr:0Xt8DvMSZM1ELyfssxB4r

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://jolantagraban.pl/log/57843441668980/dll/assistant.php

Targets

    • Target

      4748877c4e4c31b6755c352c23488b4c

    • Size

      300KB

    • MD5

      4748877c4e4c31b6755c352c23488b4c

    • SHA1

      0a0cda5921b28c7c95a253d6c94eef40b3226f56

    • SHA256

      11827dd777333a8deef8847d36a7070bc1732870e64d5f98cf72efe56dfe9e83

    • SHA512

      97ef01d2b9918967a00cb07466904b3da90f0919d1d9074b58d84740dca7ddcc5599d6d87d8366073798b837c4d14eea93916d3f81183f71e6fda8cbe5775071

    • SSDEEP

      6144:0Xt/0DvgNSBWaMP92QXcI0yjUTTkSP/C9XSRsOigKuhkNGr:0Xt8DvMSZM1ELyfssxB4r

    Score
    10/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks