General

  • Target

    d59eb32c67feacb9d79fe315bf304d5f .js

  • Size

    1.3MB

  • Sample

    240506-jacvvagc55

  • MD5

    d59eb32c67feacb9d79fe315bf304d5f

  • SHA1

    a3bfbfa3216bd083085d47583cfc991731ee2f4b

  • SHA256

    d9e9cd6107b1f2a44a9d0ff9cf16eca68680851d7f0eead5830c5f2a01b6c003

  • SHA512

    44fdbb965adbc4ecd77dd5035fc7c76f822764bd41c765a41eafd6227b2515ba898a86f36aecab2d6f2222129f5123f455b74322fbbb25bab090cdd310a02085

  • SSDEEP

    768:IJqH+QqJcx5TnTi9ta7SuHiHwdcU6AH6xgO:xqo5TnTi9A6H9AH83

Malware Config

Targets

    • Target

      d59eb32c67feacb9d79fe315bf304d5f .js

    • Size

      1.3MB

    • MD5

      d59eb32c67feacb9d79fe315bf304d5f

    • SHA1

      a3bfbfa3216bd083085d47583cfc991731ee2f4b

    • SHA256

      d9e9cd6107b1f2a44a9d0ff9cf16eca68680851d7f0eead5830c5f2a01b6c003

    • SHA512

      44fdbb965adbc4ecd77dd5035fc7c76f822764bd41c765a41eafd6227b2515ba898a86f36aecab2d6f2222129f5123f455b74322fbbb25bab090cdd310a02085

    • SSDEEP

      768:IJqH+QqJcx5TnTi9ta7SuHiHwdcU6AH6xgO:xqo5TnTi9A6H9AH83

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks