General

  • Target

    bfcc207a11b00be050cd343c29610cdf

  • Size

    731B

  • Sample

    240311-emta5sbf43

  • MD5

    bfcc207a11b00be050cd343c29610cdf

  • SHA1

    0842a47f067121ff811ee7dd00bc167906738909

  • SHA256

    8065cd13f47664398c8c02165ca41f9c7f8f823e018f2773e947d63c8ba4bc2b

  • SHA512

    03b25ea72b73c10b3c140e25585d753a32baaf3325b96158612aab0fd7260e6df878d77f2553ba4b73be930a1c2badad0bc31a76ff9453ea346e223035a78a41

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://transfer.sh/1fWuoMe/bypass.txt

Targets

    • Target

      bfcc207a11b00be050cd343c29610cdf

    • Size

      731B

    • MD5

      bfcc207a11b00be050cd343c29610cdf

    • SHA1

      0842a47f067121ff811ee7dd00bc167906738909

    • SHA256

      8065cd13f47664398c8c02165ca41f9c7f8f823e018f2773e947d63c8ba4bc2b

    • SHA512

      03b25ea72b73c10b3c140e25585d753a32baaf3325b96158612aab0fd7260e6df878d77f2553ba4b73be930a1c2badad0bc31a76ff9453ea346e223035a78a41

    Score
    10/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks