General

  • Target

    Call_and_put_contracts_26605.zip

  • Size

    2.2MB

  • Sample

    240521-2zrdmsda7z

  • MD5

    c48c49d59bddacbc89b09bbdf35411d5

  • SHA1

    9ad0dd3044ca4fb250c38619c0ef4e9ca311236c

  • SHA256

    95ae75280d51130009fa5e1b468dfbf6dc8bb1e80d1e1c343892cf3950bfcd14

  • SHA512

    0a2fe3325979409383838a9143379d47c12df0d9e993ac51dcc7d0efd163e319f2194f874c853d400380a44812331fa7f472383f9ed2196d33ae3d5638655c9f

  • SSDEEP

    49152:fLfr9zXMJaclirt7PcZDwCdb+SfKtcP98jBOU1qN:fLtXMJacla9cGCdHfKtY0OpN

Malware Config

Targets

    • Target

      call and put contracts 16318.js

    • Size

      8.8MB

    • MD5

      88ab74d84774855d0a2c24d5a1b50389

    • SHA1

      83ce4e759d3443332eb223689717b4895bd4e6cc

    • SHA256

      f8f3fa45eced0c32fbbf912f3f8ba6100a8b59e14f12a125c88340a47cf7e57b

    • SHA512

      cf5adf3cb923ddb264b6f2182be043859c3c16544bbc2d3c01f0469ca6a25702ece7b140438928067226a334d88ac7567e808ecab5b97731678a2e948e399e87

    • SSDEEP

      49152:kYytwpCQK+aGYytwpCQK+aGYytwpCQK+aGYytwpCQK+aGYytwpCQK+aGYytwpCQO:f

    • GootLoader

      JavaScript loader known for delivering other families such as Gootkit and Cobaltstrike.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks