General
-
Target
2909d91ea68773d217427682f60fc6acd00a18ce44629db77a3e4c74d6ee1ace.hta
-
Size
130KB
-
Sample
241024-bmm8caxfmb
-
MD5
044731c733f45405761bdca10462abb3
-
SHA1
8e04de6c19e4e1336a88fdbf3008a912055c4f5d
-
SHA256
2909d91ea68773d217427682f60fc6acd00a18ce44629db77a3e4c74d6ee1ace
-
SHA512
4fa5a1a7c896f0a15f04049f9c92cecfe9910c4c5b9dcfd84a047b50595064b772d1401cf48723b47a7d4285119ff1a9c6fb1ad4b771a398e3f6f2da1928d9d2
-
SSDEEP
96:Eam7hkF0pF7OXfn7g32Kfd8KusjoU9FZ/87T:Ea2he0/qP7gGKCqoUDZ/CT
Static task
static1
Behavioral task
behavioral1
Sample
2909d91ea68773d217427682f60fc6acd00a18ce44629db77a3e4c74d6ee1ace.hta
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2909d91ea68773d217427682f60fc6acd00a18ce44629db77a3e4c74d6ee1ace.hta
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Targets
-
-
Target
2909d91ea68773d217427682f60fc6acd00a18ce44629db77a3e4c74d6ee1ace.hta
-
Size
130KB
-
MD5
044731c733f45405761bdca10462abb3
-
SHA1
8e04de6c19e4e1336a88fdbf3008a912055c4f5d
-
SHA256
2909d91ea68773d217427682f60fc6acd00a18ce44629db77a3e4c74d6ee1ace
-
SHA512
4fa5a1a7c896f0a15f04049f9c92cecfe9910c4c5b9dcfd84a047b50595064b772d1401cf48723b47a7d4285119ff1a9c6fb1ad4b771a398e3f6f2da1928d9d2
-
SSDEEP
96:Eam7hkF0pF7OXfn7g32Kfd8KusjoU9FZ/87T:Ea2he0/qP7gGKCqoUDZ/CT
Score10/10-
Blocklisted process makes network request
-
Evasion via Device Credential Deployment
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-