General

  • Target

    code.vbs

  • Size

    1KB

  • Sample

    240628-lqf9basgld

  • MD5

    c8db0910ef325367970ff1c2b5130701

  • SHA1

    2b0ca564f0103ad0b6bfb52d2c9a1a8965171fc3

  • SHA256

    0d0bafc8f1c3a563f60ad72972b9e2c01fd40286920a1be6dce381999d9db9a7

  • SHA512

    7777856eb1e83c6f1ef3f72e6e9707502aef013cca449ed6e831999ed6cafe31adf6f8e59012ed097867275dff49b619f81baf0dfd7365e5952b873db2642c1f

Malware Config

Targets

    • Target

      code.vbs

    • Size

      1KB

    • MD5

      c8db0910ef325367970ff1c2b5130701

    • SHA1

      2b0ca564f0103ad0b6bfb52d2c9a1a8965171fc3

    • SHA256

      0d0bafc8f1c3a563f60ad72972b9e2c01fd40286920a1be6dce381999d9db9a7

    • SHA512

      7777856eb1e83c6f1ef3f72e6e9707502aef013cca449ed6e831999ed6cafe31adf6f8e59012ed097867275dff49b619f81baf0dfd7365e5952b873db2642c1f

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Modifies system executable filetype association

MITRE ATT&CK Enterprise v15

Tasks