Resubmissions

27-11-2024 14:01

241127-rb255aspdr 10

27-11-2024 14:01

241127-rbjzjsspcj 1

27-11-2024 13:58

241127-raadqawmcy 10

General

  • Target

    $RDOOKRE.js.zip

  • Size

    7KB

  • Sample

    241127-raadqawmcy

  • MD5

    b2ff1db12f44008428a6492eec813015

  • SHA1

    fffa2a667e815782979ce4a2a47876899f9e3f71

  • SHA256

    2ec477f607bff57fab8762f99c4c316d467d384d3a6d3ec12286e330b1a49696

  • SHA512

    ba109e60842ee5b6d538ff31191455f234cfff78f644b6012f0c026b28e7a9da3cd9fa9730eb7a1759e2ae20c3cb9847d6256802ddaa31ea3aad3c3f8c1f76d4

  • SSDEEP

    96:AkNHCeBaX8+ETiDirKWhbebO0RXDxpc0YqRgZc/kOSKijeTl55jv9xFHqg/xB8vK:AtMkirKbHVC0VD/kn9ju7PFHqYQ0Mm

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://drive.google.com/uc?export=download&id=

Targets

    • Target

      $RDOOKRE.js

    • Size

      199KB

    • MD5

      0dc3ee0972ecfb9e62b68dccc42a73bf

    • SHA1

      7f882e78a7909c006b34e4a8fd916bf8ef839a64

    • SHA256

      4e0681a5ca00bde3ae2ab6d71b6f9d22aa579274768ae594848e7a6aa279fce6

    • SHA512

      dcaf3a3ab69c4c8e9d39e65b514e4cc70a289af94c21a3e673f5a68ca6e3559218ca91f528f3023a2c243b3093d6f504e741b0c4ac72c99fbed4bc0c844e8831

    • SSDEEP

      3072:AW1tKbWXt+NWXt+NWXt+NWXt+NWXt+NWXt+YWXt+NWXt+NWXt+NWXt+NWXt+NWXC:p

    Score
    10/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks