General
-
Target
01112024_0726_31102024_Collaboration Request.zip
-
Size
8KB
-
Sample
241101-h92gtaycle
-
MD5
159a95d54a241ba94dc10be0d3f0bcf6
-
SHA1
2ac9716c89e2e32262f5929e6a908a46934c61d5
-
SHA256
397c1cb5536c84ebaf2ab511cf4183be4364ed6619c0bfaf2ac816a99ec49a4a
-
SHA512
da65ee801bdf975a34ba707e07c6654a1863bc8fedafcca6edce4597aa1c0476dcf6a18d9efd5e5b434f616ee9b69d96e5bc7261482d728b8073539446e28b5a
-
SSDEEP
192:aNOW255H8Gr60k3ZZxmNCvdqhe+GlJje5i:Wf25iC60k3vi5Qxj6i
Static task
static1
Behavioral task
behavioral1
Sample
Collaboration Request/Company Info.js
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Collaboration Request/Company Info.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Collaboration Request/RFQ.js
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Collaboration Request/RFQ.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Extracted
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur
Targets
-
-
Target
Collaboration Request/Company Info.js
-
Size
15KB
-
MD5
03cf8621c289fbd13ebf3f14837da3d1
-
SHA1
61239e9eeb422eb59306f354546fcd8317a2ce69
-
SHA256
4d8fd3bbbcf0f1ab58cbef0b189ed1e3abbf6ff523c0b478f80fffc2aa36ba53
-
SHA512
c1a3483d30f211bd5d17feaa7081c8e75353cf3b556b4bbb86c611b553db8a580c24bcb52c8c0a8c15df20100da4b91aa6e99563466789eee7dedbe1a1513d8a
-
SSDEEP
384:zkICeaCPI9hUmMLVmdZyukUQqhHdHviwDv:QICjC6hDYmdZKUQqh9PiwDv
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
Collaboration Request/RFQ.js
-
Size
15KB
-
MD5
e1b56b06f44512e79ce26a1db4958fa0
-
SHA1
5c0a3a02fd37d85330012ac27ee59cd05466f866
-
SHA256
943e6c8dd31effd085cd83c1f681d8c2f5d7d1967b34dacfed7ac3db51d60c1b
-
SHA512
b5a3e3c82a812375da64ad2e7ba3820d9058adc2f5f3d45035984b27dec64451cbd45b547385e7de221e82b01967aff2495d33a826eb0738871c739a27b95770
-
SSDEEP
384:zktd8aCPI9hUmMLVmdZyukUnRHxHCiDze:QtdhC6hDYmdZKUnRRiiDze
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-