General

  • Target

    https://app.go.tungstenautomation.com/e/er?utm_medium=email&utm_source=eloqua&partnerref=29686&s=2023&lid=11516&elqTrackId=178EBC1F7B9C8FB097F02B5A8D32C434&elqTrack=true&elq=811547881e0f46b68f06ab3a89f96578&elqaid=29686&elqat=1&elqak=8AF58DEF829CEB8304145A4FE5A3985793C606CD87994AA00F5CC966DFA0DE293AFF

  • Sample

    240919-fg34ts1hma

Score
8/10

Malware Config

Targets

    • Target

      https://app.go.tungstenautomation.com/e/er?utm_medium=email&utm_source=eloqua&partnerref=29686&s=2023&lid=11516&elqTrackId=178EBC1F7B9C8FB097F02B5A8D32C434&elqTrack=true&elq=811547881e0f46b68f06ab3a89f96578&elqaid=29686&elqat=1&elqak=8AF58DEF829CEB8304145A4FE5A3985793C606CD87994AA00F5CC966DFA0DE293AFF

    Score
    8/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks