General

  • Target

    aab5fa54e9d1e9e0b21a39317d822650

  • Size

    187KB

  • Sample

    240228-cd26ksgf92

  • MD5

    aab5fa54e9d1e9e0b21a39317d822650

  • SHA1

    e8839081f0ddd05777ff050f5e7df206d771206a

  • SHA256

    724892913c747bc2e3123663362df4b402a703f51c9df8bc3ec58e3253a6a3d5

  • SHA512

    6a7ec85a378131f5d5f8fdab374b368bb927e7451430a4708059adf25873baf26e4c0881ec640e4e7a1f4b2d58fe58da8b46c113785eaa68ae2f14e52599aef4

  • SSDEEP

    3072:0XtbL06VLNFAjWWFFVU5qRHWniD3XgwB7/ttduDk7BwZh97cqvtVn/kyuzf0aVRC:0Xt/0D/7duDgW7P44oRgijg

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://jolantagraban.pl/log/57843441668980/dll/assistant.php

Targets

    • Target

      aab5fa54e9d1e9e0b21a39317d822650

    • Size

      187KB

    • MD5

      aab5fa54e9d1e9e0b21a39317d822650

    • SHA1

      e8839081f0ddd05777ff050f5e7df206d771206a

    • SHA256

      724892913c747bc2e3123663362df4b402a703f51c9df8bc3ec58e3253a6a3d5

    • SHA512

      6a7ec85a378131f5d5f8fdab374b368bb927e7451430a4708059adf25873baf26e4c0881ec640e4e7a1f4b2d58fe58da8b46c113785eaa68ae2f14e52599aef4

    • SSDEEP

      3072:0XtbL06VLNFAjWWFFVU5qRHWniD3XgwB7/ttduDk7BwZh97cqvtVn/kyuzf0aVRC:0Xt/0D/7duDgW7P44oRgijg

    Score
    10/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks