General

  • Target

    204d12339aee656dd74ae793af50b97780da2297716a222ca9d5e5716b1e729c

  • Size

    127KB

  • Sample

    241013-x9vftsyepq

  • MD5

    572c427f4a6204d0c1d16840e3ea6807

  • SHA1

    db81d828a801af0ea640aa186df1a17fb9fe75d7

  • SHA256

    204d12339aee656dd74ae793af50b97780da2297716a222ca9d5e5716b1e729c

  • SHA512

    b9e27e057914e8b5fa2deb370d3e0ea32b51dc306a4e4fcc9cd903841674835d748755a7872129cdcb399f95cfcd5f4848ef7c97b70bba8e1c40cf8e5700f0e8

  • SSDEEP

    3072:Z63Q77Nv63Q77NWTSjPXw23TGB4VasGu3T4ya:IQ7JeQ7Jugvw2Q6asGb

Malware Config

Targets

    • Target

      204d12339aee656dd74ae793af50b97780da2297716a222ca9d5e5716b1e729c

    • Size

      127KB

    • MD5

      572c427f4a6204d0c1d16840e3ea6807

    • SHA1

      db81d828a801af0ea640aa186df1a17fb9fe75d7

    • SHA256

      204d12339aee656dd74ae793af50b97780da2297716a222ca9d5e5716b1e729c

    • SHA512

      b9e27e057914e8b5fa2deb370d3e0ea32b51dc306a4e4fcc9cd903841674835d748755a7872129cdcb399f95cfcd5f4848ef7c97b70bba8e1c40cf8e5700f0e8

    • SSDEEP

      3072:Z63Q77Nv63Q77NWTSjPXw23TGB4VasGu3T4ya:IQ7JeQ7Jugvw2Q6asGb

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks