General

  • Target

    JJSploitBootstrapper.bat

  • Size

    992B

  • Sample

    240920-dgsa8avera

  • MD5

    bca8f39baed66bcfcc6aaf4804a7770f

  • SHA1

    198fde86f372a658952ea1a9b18601d8672585d6

  • SHA256

    a62f52af73df95dfb8482f0658fd396ccce80460a17bbeeabad15afd4757a9c6

  • SHA512

    4330793748cfc3ca02dc7258d4c60dd8ab58623ffe90e2704a33544d4625b9a70e9c7ab0f611f29534b69af2bcf7068e9f982615ca997037f0ed5cde0103e972

Malware Config

Targets

    • Target

      JJSploitBootstrapper.bat

    • Size

      992B

    • MD5

      bca8f39baed66bcfcc6aaf4804a7770f

    • SHA1

      198fde86f372a658952ea1a9b18601d8672585d6

    • SHA256

      a62f52af73df95dfb8482f0658fd396ccce80460a17bbeeabad15afd4757a9c6

    • SHA512

      4330793748cfc3ca02dc7258d4c60dd8ab58623ffe90e2704a33544d4625b9a70e9c7ab0f611f29534b69af2bcf7068e9f982615ca997037f0ed5cde0103e972

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks