General
-
Target
10f2af74b935ffc5664a6a9bf0d141f30777e4211ef4d75ad65c6db77554cbfb.bat
-
Size
32KB
-
Sample
241122-cjst4askay
-
MD5
35dfb522fddada4616e915fb17888e31
-
SHA1
8fbbfe83e8f5faa59037fbbf4fd97bc2c78f95e6
-
SHA256
10f2af74b935ffc5664a6a9bf0d141f30777e4211ef4d75ad65c6db77554cbfb
-
SHA512
9e35fa005d0e1756bcf45b43db52c7be1ff584f8cdbf4349c06d6cabdff03acd1ea32c2e3cfc72cbd28b7d41853b2e7c44784b5d1e585b7fae2dc480e60305a5
-
SSDEEP
384:UuGq+dSBNrJ0AKr6CLNOPKQdKJGE9v62FTJsN/6SdRfIeq2sOGLtY6:mq+dSBNdBKrhLNJL8E9rTJsNCSE3w96
Static task
static1
Behavioral task
behavioral1
Sample
10f2af74b935ffc5664a6a9bf0d141f30777e4211ef4d75ad65c6db77554cbfb.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10f2af74b935ffc5664a6a9bf0d141f30777e4211ef4d75ad65c6db77554cbfb.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://www.dropbox.com/scl/fi/qukhm5nxh9vj4yeib9imn/20_Advertising_Campaign_and_Collaboration.docx?rlkey=wbac1g8wzi5e49dnttqx9sv3h&st=g4q7mwtc&dl=1
Extracted
https://gitlab.com/bosechang/mkt/-/raw/main/20Fukrun.zip
Targets
-
-
Target
10f2af74b935ffc5664a6a9bf0d141f30777e4211ef4d75ad65c6db77554cbfb.bat
-
Size
32KB
-
MD5
35dfb522fddada4616e915fb17888e31
-
SHA1
8fbbfe83e8f5faa59037fbbf4fd97bc2c78f95e6
-
SHA256
10f2af74b935ffc5664a6a9bf0d141f30777e4211ef4d75ad65c6db77554cbfb
-
SHA512
9e35fa005d0e1756bcf45b43db52c7be1ff584f8cdbf4349c06d6cabdff03acd1ea32c2e3cfc72cbd28b7d41853b2e7c44784b5d1e585b7fae2dc480e60305a5
-
SSDEEP
384:UuGq+dSBNrJ0AKr6CLNOPKQdKJGE9v62FTJsN/6SdRfIeq2sOGLtY6:mq+dSBNdBKrhLNJL8E9rTJsNCSE3w96
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-