General
-
Target
ed4a940aceec4031ec56fa375a11dc60.bin
-
Size
2KB
-
Sample
240111-ekh3dsebeq
-
MD5
d307f80298c64071ebf830915fe94911
-
SHA1
1d44ddcc3f52a741426f29c16e994136489087f3
-
SHA256
769006583bec47caecc33764e3752253ed765e6f49270621d5904e28fb0d51d2
-
SHA512
62686be7e30c981553274e289ea7675426c0b39f289cee625c21ca9b7dc0449a80fe957046bbbb106757604ef3053bdfe0d1f3f4d375a57bdd71a1388d97a385
Static task
static1
Behavioral task
behavioral1
Sample
2036c55eeff25d6200dcbf7d4b91bf4137c9829e6435a451ded924c828ec662e.js
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2036c55eeff25d6200dcbf7d4b91bf4137c9829e6435a451ded924c828ec662e.js
Resource
win10v2004-20231222-en
Malware Config
Targets
-
-
Target
2036c55eeff25d6200dcbf7d4b91bf4137c9829e6435a451ded924c828ec662e.js
-
Size
420KB
-
MD5
ed4a940aceec4031ec56fa375a11dc60
-
SHA1
363a4d5dcf4a5da377c8e0a776216aa2dce7548d
-
SHA256
2036c55eeff25d6200dcbf7d4b91bf4137c9829e6435a451ded924c828ec662e
-
SHA512
e39fb8d235c097de87b15cabe8df770dcd410e4d155b363074d43e80ead98535d864db6647564c819d5500fc2dd92793bf690e2a088f0feca317561f14d7f073
-
SSDEEP
96:83/QJGLDYV9vLQQQQHrmkKnQVUEyVe+4wTRwPZ8:oEfQQQQHrmkKnQVUEyVe+4wTRwPZ8
Score10/10-
Blocklisted process makes network request
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Registers COM server for autorun
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1