General

  • Target

    new.bat

  • Size

    1.9MB

  • Sample

    241120-mqlz8swdrr

  • MD5

    236a30633019cf4b67db32def072c413

  • SHA1

    e6b3f1a0ee7d09f3fa1f99ae9e2e7714c027e82e

  • SHA256

    887a311306a54b0f98ef67a1dbf32734e2e92a3572b6f4300231eaee7f5ecb84

  • SHA512

    2eba2aa0126985c6ac16bea71db4d719ad3da5fad446facae2801bd5f5167d8881121a39d79e13162240a19821f09147eca315efd8409a8a2778e4b33a6d8e3e

  • SSDEEP

    24576:wxVq/CkT1yUMC2HFVn0+KynwyPXH8sMY4HU+MIQif3dOqKyPvaQaPjrjwVs6M3KL:w7gcjCOH8WmUKtdXUGjn

Score
10/10

Malware Config

Targets

    • Target

      new.bat

    • Size

      1.9MB

    • MD5

      236a30633019cf4b67db32def072c413

    • SHA1

      e6b3f1a0ee7d09f3fa1f99ae9e2e7714c027e82e

    • SHA256

      887a311306a54b0f98ef67a1dbf32734e2e92a3572b6f4300231eaee7f5ecb84

    • SHA512

      2eba2aa0126985c6ac16bea71db4d719ad3da5fad446facae2801bd5f5167d8881121a39d79e13162240a19821f09147eca315efd8409a8a2778e4b33a6d8e3e

    • SSDEEP

      24576:wxVq/CkT1yUMC2HFVn0+KynwyPXH8sMY4HU+MIQif3dOqKyPvaQaPjrjwVs6M3KL:w7gcjCOH8WmUKtdXUGjn

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks