General

  • Target

    http://feregerg

  • Sample

    240805-yqxbrazhnh

Score
8/10

Malware Config

Targets

    • Target

      http://feregerg

    Score
    8/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks