General
-
Target
96f778ab06125c86584d5a815548e7c8d8a94d60.zip.tar.gz
-
Size
1KB
-
Sample
240326-mhg2bagb36
-
MD5
1e59d6e4282759f61dfceba048d24da6
-
SHA1
e3604399a075d3157e115156c212d03b921c2740
-
SHA256
aab1adb71b6c05fe837b6b59a6c920635b54dc003e4bea7b9b22b59d68892576
-
SHA512
f542f0423fca1c4a390bd5ce9fc9361d987bafb767f979cb22dc78e8f8485cd700a7c17ed88f82bef3761a2c6bf7d90a677584bf6394d2d4f1edf08125a4aa1c
Static task
static1
Behavioral task
behavioral1
Sample
Order/Order.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Order/Order.lnk
Resource
win10v2004-20240226-en
Malware Config
Extracted
http://busyestinglsv.site/cmeo/ahbsfrbahogrfoweybrzhfbshdlhabdfhbawvgfrweifrvboherjbvfwr/zxfhvgkhchbavsdfabvlgf1244rhgv5hvkghvkhvkh6vkgvh/clips.exe
Targets
-
-
Target
Order/Order.lnk
-
Size
2KB
-
MD5
f88d5c71b79d93f336a5fbc20deeb9dd
-
SHA1
1f77d2879725462577a73adbf83d07c60eb6a384
-
SHA256
a4e51b364548e87948d0075a8adffcd901d2876950ce6f0a939413a0d450b752
-
SHA512
e369ed33574528497c330c79630e49971b4398bc089f239648c270774a62086436a36503db5052d9df72a56a0a8113ac0c9c09e7d86b41ad999c15e1cfc404d2
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-