General

  • Target

    Rogers2023.vbs

  • Size

    1KB

  • Sample

    240128-py79jsahc9

  • MD5

    7c86b22fd57b3992e3750c3e66dfe9eb

  • SHA1

    306b70d36f32ff0d03e51159503c50f31e584cd9

  • SHA256

    531608d352c2959e768c8dbdb56e7a712986a51d946c9ab90733429ed12534d2

  • SHA512

    4b86347aff80553988748e3e4bc457eafd552f27cc438623eddfcf387290f4b43d3aeb55e4e03e82472cff195946f573a7edca367a35441f640caa2ef9a1631f

Score
8/10

Malware Config

Targets

    • Target

      Rogers2023.vbs

    • Size

      1KB

    • MD5

      7c86b22fd57b3992e3750c3e66dfe9eb

    • SHA1

      306b70d36f32ff0d03e51159503c50f31e584cd9

    • SHA256

      531608d352c2959e768c8dbdb56e7a712986a51d946c9ab90733429ed12534d2

    • SHA512

      4b86347aff80553988748e3e4bc457eafd552f27cc438623eddfcf387290f4b43d3aeb55e4e03e82472cff195946f573a7edca367a35441f640caa2ef9a1631f

    Score
    8/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks