General
-
Target
ballz.ps1
-
Size
23KB
-
Sample
240426-151ntsdc38
-
MD5
b6eb389046df18695de5a33a7ee99945
-
SHA1
26198f7f328a4ba8e0d4cdf233806f7ed0d06a61
-
SHA256
ffb5696214ffb9c8bf87c62319a23de3c0f8f4966173a86617de741bf1d16429
-
SHA512
b7eba55f9c955c93d2a5272bb3f2eb656aea491372b96ba147c053213f06a2476f55aab578d40df7bfb7dd3c556f3a18443963bdc3f57adcd47575d97e5c3058
-
SSDEEP
192:8Syr8R+PR9KPI/zUAxzPVintiKwA/ntfnHeJ5knYpBwnnHnx13jdPflxRS5xVLTM:BrHeJER7AKApfOfv
Static task
static1
Behavioral task
behavioral1
Sample
ballz.ps1
Resource
win10v2004-20240226-en
Malware Config
Extracted
https://cdn.discordapp.com/attachments/1208191072119816315/1233532538975289364/real.exe?ex=662d7033&is=662c1eb3&hm=ff7acb3539fe2d7a01e6a1d36f1dc29c8c7302d05683ab0334fe9716ecf12c5d&
Targets
-
-
Target
ballz.ps1
-
Size
23KB
-
MD5
b6eb389046df18695de5a33a7ee99945
-
SHA1
26198f7f328a4ba8e0d4cdf233806f7ed0d06a61
-
SHA256
ffb5696214ffb9c8bf87c62319a23de3c0f8f4966173a86617de741bf1d16429
-
SHA512
b7eba55f9c955c93d2a5272bb3f2eb656aea491372b96ba147c053213f06a2476f55aab578d40df7bfb7dd3c556f3a18443963bdc3f57adcd47575d97e5c3058
-
SSDEEP
192:8Syr8R+PR9KPI/zUAxzPVintiKwA/ntfnHeJ5knYpBwnnHnx13jdPflxRS5xVLTM:BrHeJER7AKApfOfv
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-