General

  • Target

    lnvoice.js

  • Size

    1.3MB

  • Sample

    240506-hkwj9sfd87

  • MD5

    65f9c67965df098ac25026ce6b229861

  • SHA1

    683649d54495bc1efa6dc22e3efab1c2ac3116fd

  • SHA256

    acb9edc3989f14d72f7994426388cc89f9e7a2167160b5cfa971fe0b78299288

  • SHA512

    bdcb1a1c24c5148b37b8a3e3ff96305d3637e8e39d9811ea507a8481c682080195d1b7e12b57e42d6572925d8164c1edfb491911dd28277bd37432961d05c0b8

  • SSDEEP

    384:AhSvcDV0ZbSpIM8yvPMGjYD9s4S6SVh+GjhmSPgEH0vO6/scXeDQX45vH58jcX52:AhSvWISpEhRLXriI

Malware Config

Targets

    • Target

      lnvoice.js

    • Size

      1.3MB

    • MD5

      65f9c67965df098ac25026ce6b229861

    • SHA1

      683649d54495bc1efa6dc22e3efab1c2ac3116fd

    • SHA256

      acb9edc3989f14d72f7994426388cc89f9e7a2167160b5cfa971fe0b78299288

    • SHA512

      bdcb1a1c24c5148b37b8a3e3ff96305d3637e8e39d9811ea507a8481c682080195d1b7e12b57e42d6572925d8164c1edfb491911dd28277bd37432961d05c0b8

    • SSDEEP

      384:AhSvcDV0ZbSpIM8yvPMGjYD9s4S6SVh+GjhmSPgEH0vO6/scXeDQX45vH58jcX52:AhSvWISpEhRLXriI

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks