General

  • Target

    879dc95c721b68613a3b30899288749e6331fbe698e823092ee9d89ce2318b1a.vbs

  • Size

    12KB

  • Sample

    241121-hec6qstpfn

  • MD5

    2c548eb64145d9cd7308584191ff0976

  • SHA1

    f2a0f23393dbe76a37819e3b76b7cb24070d696d

  • SHA256

    879dc95c721b68613a3b30899288749e6331fbe698e823092ee9d89ce2318b1a

  • SHA512

    85d3f5ecab588ae6b715dccd14bfb6f5f2d729ddc5abf2bedb62cd6b3ce5bf3049d2615dade76993e76b683de76f443da93a1f273efe420d1c7bd626379dcf76

  • SSDEEP

    192:k9L/aGdqjaQlUsQRwitSUCUaQlWL3MgZrdGHRkfkI:km/5+ww3ScgZrdGHRk8I

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

exe.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

Targets

    • Target

      879dc95c721b68613a3b30899288749e6331fbe698e823092ee9d89ce2318b1a.vbs

    • Size

      12KB

    • MD5

      2c548eb64145d9cd7308584191ff0976

    • SHA1

      f2a0f23393dbe76a37819e3b76b7cb24070d696d

    • SHA256

      879dc95c721b68613a3b30899288749e6331fbe698e823092ee9d89ce2318b1a

    • SHA512

      85d3f5ecab588ae6b715dccd14bfb6f5f2d729ddc5abf2bedb62cd6b3ce5bf3049d2615dade76993e76b683de76f443da93a1f273efe420d1c7bd626379dcf76

    • SSDEEP

      192:k9L/aGdqjaQlUsQRwitSUCUaQlWL3MgZrdGHRkfkI:km/5+ww3ScgZrdGHRk8I

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

MITRE ATT&CK Enterprise v15

Tasks