General

  • Target

    AS-FACTURA2030𝕗𝟘𝟡20049059039057⃣6⃣7⃣1247.zip

  • Size

    178KB

  • Sample

    240306-3l3p7acf6z

  • MD5

    f507318cb32ad34f8d9afeb3f3786040

  • SHA1

    1e2c2b59416fa5cb146003d3611fb7acab95eb5e

  • SHA256

    01a675d406ccf8f61ebc2850c0df0bfca96da3f12f97003224392cbfa8c29cec

  • SHA512

    cdab5d60a7f37709ca912eb6d3ac0a7b17365f5f0e4848ca055f50ac67b8213126b66cac4b6651b9a32aaeb574d56e166d90326366e2f3d35784b8216b8b72f9

  • SSDEEP

    3072:JZT1EOlKy/uFII/m0oCmtbNz1bTAu0AQt5/E94QavrrdGk3FRMY2SKdvlMXztvVl:JZT1Edy/CZqz9Ae4/UO2fNM1Vl

Score
8/10

Malware Config

Targets

    • Target

      S-FACTURA2030𝕗𝟘𝟡20049059039057⃣6⃣7⃣07jlJ.MSI

    • Size

      408KB

    • MD5

      74713b38f7fc6dad893684948b941e65

    • SHA1

      3090154f42e728f7c1de36f1e7c9e78075a3d999

    • SHA256

      17771bd38e0bf7cf7f0118e70ccfe3fedbf1c8a4a5b426aacd62a8bbb31fa68c

    • SHA512

      f2d7b544afc6e4b1f731cefca7472fcc39fc39d259aee5cb1d8bec2f441729c3366780c5304de5e0d42e4b74566f0e42c04ea40db192e09aee50dd31a76d28a6

    • SSDEEP

      6144:d7XaD+m4jXhtzPEBxB0Z1h1a93j3GruNmdDxjOCdx:dLPm4jxtzPEfBAMyruNm7dx

    Score
    8/10
    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks