General

  • Target

    ed4a940aceec4031ec56fa375a11dc60.bin

  • Size

    2KB

  • Sample

    240111-ekh3dsebeq

  • MD5

    d307f80298c64071ebf830915fe94911

  • SHA1

    1d44ddcc3f52a741426f29c16e994136489087f3

  • SHA256

    769006583bec47caecc33764e3752253ed765e6f49270621d5904e28fb0d51d2

  • SHA512

    62686be7e30c981553274e289ea7675426c0b39f289cee625c21ca9b7dc0449a80fe957046bbbb106757604ef3053bdfe0d1f3f4d375a57bdd71a1388d97a385

Malware Config

Targets

    • Target

      2036c55eeff25d6200dcbf7d4b91bf4137c9829e6435a451ded924c828ec662e.js

    • Size

      420KB

    • MD5

      ed4a940aceec4031ec56fa375a11dc60

    • SHA1

      363a4d5dcf4a5da377c8e0a776216aa2dce7548d

    • SHA256

      2036c55eeff25d6200dcbf7d4b91bf4137c9829e6435a451ded924c828ec662e

    • SHA512

      e39fb8d235c097de87b15cabe8df770dcd410e4d155b363074d43e80ead98535d864db6647564c819d5500fc2dd92793bf690e2a088f0feca317561f14d7f073

    • SSDEEP

      96:83/QJGLDYV9vLQQQQHrmkKnQVUEyVe+4wTRwPZ8:oEfQQQQHrmkKnQVUEyVe+4wTRwPZ8

    • UAC bypass

    • Blocklisted process makes network request

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Registers COM server for autorun

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks