General

  • Target

    Booking.com-1728394029.js

  • Size

    116KB

  • Sample

    240106-p14n5sgfbl

  • MD5

    21d0aeadf942a9c42a0f48143af18bba

  • SHA1

    a1c7b79e09df8713c22c4b8f228af4869502719a

  • SHA256

    3ea81c292f36f2583d2291e8a393014da62767447dba7b139a6c45574647aa2b

  • SHA512

    1e5472589584b31f533e8d021aeab5ddb5eeb23ebf278e736fd4a0cb5957f86c557c0648fa6aab508e162b87946368480501022139ea2175ccf46e1cc21258c3

  • SSDEEP

    96:/umTnP/I5Vrquo0wwyEJmnU6HAVkEyle+YQdgv5M:2InHO8uo0ww7mU6HAVkEyle+YQdgv5M

Malware Config

Targets

    • Target

      Booking.com-1728394029.js

    • Size

      116KB

    • MD5

      21d0aeadf942a9c42a0f48143af18bba

    • SHA1

      a1c7b79e09df8713c22c4b8f228af4869502719a

    • SHA256

      3ea81c292f36f2583d2291e8a393014da62767447dba7b139a6c45574647aa2b

    • SHA512

      1e5472589584b31f533e8d021aeab5ddb5eeb23ebf278e736fd4a0cb5957f86c557c0648fa6aab508e162b87946368480501022139ea2175ccf46e1cc21258c3

    • SSDEEP

      96:/umTnP/I5Vrquo0wwyEJmnU6HAVkEyle+YQdgv5M:2InHO8uo0ww7mU6HAVkEyle+YQdgv5M

    • UAC bypass

    • Blocklisted process makes network request

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Registers COM server for autorun

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks