General

  • Target

    OutgoingHSBCTelegraphicTransfer.pdf                               .JS.js

  • Size

    654KB

  • Sample

    240127-p1rpkscdg6

  • MD5

    f50081a699960921c3ac494c49a5338e

  • SHA1

    9580b05d3297a1a9ed8633d979da292b1a35c604

  • SHA256

    8c0554af06496cbf019db3d07c1805c8dbf731b61a0c9e4c70b559459cff3506

  • SHA512

    e6285e620fd770c1ac302f743ae6d217b11571bf64db6bb32b0ee6685f5186ecce06228789010b25addb091d8417401933635a391ad187eb0d2330e20f933a8d

  • SSDEEP

    192:+1Lj1hWOw3HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHB:sjvWOS

Malware Config

Targets

    • Target

      OutgoingHSBCTelegraphicTransfer.pdf                               .JS.js

    • Size

      654KB

    • MD5

      f50081a699960921c3ac494c49a5338e

    • SHA1

      9580b05d3297a1a9ed8633d979da292b1a35c604

    • SHA256

      8c0554af06496cbf019db3d07c1805c8dbf731b61a0c9e4c70b559459cff3506

    • SHA512

      e6285e620fd770c1ac302f743ae6d217b11571bf64db6bb32b0ee6685f5186ecce06228789010b25addb091d8417401933635a391ad187eb0d2330e20f933a8d

    • SSDEEP

      192:+1Lj1hWOw3HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHB:sjvWOS

    • UAC bypass

    • Blocklisted process makes network request

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Registers COM server for autorun

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks