General

  • Target

    9e182abd97e46d2788e637b1969deede1821bc08ece40d731ec1051be0b32330 (1)

  • Size

    134KB

  • Sample

    240523-gs97ysfh45

  • MD5

    1f2912c0c12b316023061de20ee3cc55

  • SHA1

    05cad925852e41a0832bc9bf3db5056990d027d4

  • SHA256

    9e182abd97e46d2788e637b1969deede1821bc08ece40d731ec1051be0b32330

  • SHA512

    226d9de84f0a3624e8b84ec3f89026299d457907faab3246694b04de40af76d927561ccbf463444e5049dd55ac2a72f4e727c6e10f4a490604c01738142c7f5b

  • SSDEEP

    1536:BIscHpcWN6ns7eemQA1iPFmpcEo0SlWu37kxlvtqMPeHp6o:5cHDesSemV1iQWEo0SlWA7Alvtl8f

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.49.69.41/data/b413842a6f5f431ab839f99fe3f6d3a9

Targets

    • Target

      9e182abd97e46d2788e637b1969deede1821bc08ece40d731ec1051be0b32330 (1)

    • Size

      134KB

    • MD5

      1f2912c0c12b316023061de20ee3cc55

    • SHA1

      05cad925852e41a0832bc9bf3db5056990d027d4

    • SHA256

      9e182abd97e46d2788e637b1969deede1821bc08ece40d731ec1051be0b32330

    • SHA512

      226d9de84f0a3624e8b84ec3f89026299d457907faab3246694b04de40af76d927561ccbf463444e5049dd55ac2a72f4e727c6e10f4a490604c01738142c7f5b

    • SSDEEP

      1536:BIscHpcWN6ns7eemQA1iPFmpcEo0SlWu37kxlvtqMPeHp6o:5cHDesSemV1iQWEo0SlWA7Alvtl8f

    Score
    10/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

2
T1059

PowerShell

1
T1059.001

JavaScript

1
T1059.007

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks