General

  • Target

    82bf71f9d463c60e2304cbf9f9cac022.bin

  • Size

    11KB

  • Sample

    241122-bqn9taxmem

  • MD5

    3a612ce8c27dd990bcdf2ea1b1688895

  • SHA1

    26d8a02d325eef483869813388c93ec964bfb1a4

  • SHA256

    7500c2ce57ca0f5d77facf03d2ecf4207552f164a34f2c4a802f0acfa053591f

  • SHA512

    11c2efeeb1997cc1ba130cc07797fb61746145285cd702fb3d43b38c5bd634830908a8572acb5897a026b01a21d11c114216633b442bb7206258ffca0645f2a7

  • SSDEEP

    192:a137iy9R2vx1KiEEAhB9oHp9qECuyK1hYzwNM2wh9n6RI4XZPdKDOforTy+cx5Qu:a1L1R2TKiEE2noJ1hHNMNDnUI4JJfoKP

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

exe.dropper

https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f

Targets

    • Target

      3f354bdb3557ffb64892e788c439adc0da9f7fd4f39b143a1cc2d8f7059b4488.js

    • Size

      103KB

    • MD5

      82bf71f9d463c60e2304cbf9f9cac022

    • SHA1

      d54cce9d9a238310b00d154c9f35033e62ca1d81

    • SHA256

      3f354bdb3557ffb64892e788c439adc0da9f7fd4f39b143a1cc2d8f7059b4488

    • SHA512

      19bf4493c19a438fbd21266f012f21b22a2cf0448db22c41d9994afaa200a04a621968737953c12408f7d31e9c8c0bbd253e900823364210090e98a841b5004c

    • SSDEEP

      3072:MHXp+q62Nhxdd5pdq61HXp+q62Nhxdd5pdqsVd0HXp+q62Nhxdd5pdq61HXp+q61:k3/13jc3/13+

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks