General
-
Target
ScoobyExecutor.rar
-
Size
123KB
-
Sample
240721-e22k3awemq
-
MD5
d1d9ec542f0788cca8f6a0614c33ec50
-
SHA1
fda7f43f70a4be13a7d592bd43650db2136b7c1a
-
SHA256
1296fdf7b2d6d4fa60cd18069093012ffb34e7caace3da3f841d19801b9f2d30
-
SHA512
1ecfaa8567abafc171e9c532c36395cea573bb35f17b5ea6a21fac5897a27956d2f17b7caaa51401c1fa0649e2156177b73b02e803706cccab477ac261ee0e08
-
SSDEEP
3072:/OZrFU8AN87gWJi8HMe3Cir6GDN22zZ+ET2/x/:WZZZJL3C86GDgbd
Static task
static1
Behavioral task
behavioral1
Sample
ScoobyExecutor.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ScoobyExecutor.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6521061783:AAHGo13wb3m-0882W5CagssPqANw9rPoJOw/sendMessage?chat_id=5999137434
Targets
-
-
Target
ScoobyExecutor.exe
-
Size
170KB
-
MD5
c5c80fe6de9dadf3f5e7a5bb88009923
-
SHA1
6a848d9626199d589a50ffd4ddf131a2ef9a79d2
-
SHA256
2e0c46ab1c5d954024d794629354ab7651c2a5f4ec25ae838769d0231dec7758
-
SHA512
f30fb62cd116d45f8fa29bbee962fa021a8a5f4977750344f15e51b320c8fdc7bfeb70a4f30b16c1f079212e0be397cd698e5b83cebb1a7dcd6c91ec7cd501c4
-
SSDEEP
3072:E6A9gn36+v3pJ1hZudQln+ETgyzi/xsbzpGBisagmlDDDybbMli32bf1G5tpL/Sa:E6Pn36G5J1hEdQln+2gDs/piisagmlDB
Score10/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1