General
-
Target
https://drive.google.com/file/d/1G3_2_HJsgv-3XaB1c-1LiB7FCw7Y_e2G/view?usp=sharing" shash="AHgwadQR0oti/LSs1mgMNCbwWr4tIel2pzfy1I5MA5ekINAV05visyc/LzTPeM2L6HUwp3Hfak+cgiZW2PbRpwD6YLs/S/JMmUf/d+1+BcsBf4VxoSqYjQ3itlbZYgMgUPjwQ1Lfo+DbL00md6ce11JacrEw+jJ1/KbLgguscV4=
-
Sample
250130-hatmxszlgr
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1G3_2_HJsgv-3XaB1c-1LiB7FCw7Y_e2G/view?usp=sharing" shash="AHgwadQR0oti/LSs1mgMNCbwWr4tIel2pzfy1I5MA5ekINAV05visyc/LzTPeM2L6HUwp3Hfak+cgiZW2PbRpwD6YLs/S/JMmUf/d+1+BcsBf4VxoSqYjQ3itlbZYgMgUPjwQ1Lfo+DbL00md6ce11JacrEw+jJ1/KbLgguscV4=
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://pastebin.com/raw/bYrRPs5M
https://files.catbox.moe/sakuuo.msu
https://files.catbox.moe/6sdjc5.msu
https://pastebin.com/raw/bYrRPs5M
Targets
-
-
Target
https://drive.google.com/file/d/1G3_2_HJsgv-3XaB1c-1LiB7FCw7Y_e2G/view?usp=sharing" shash="AHgwadQR0oti/LSs1mgMNCbwWr4tIel2pzfy1I5MA5ekINAV05visyc/LzTPeM2L6HUwp3Hfak+cgiZW2PbRpwD6YLs/S/JMmUf/d+1+BcsBf4VxoSqYjQ3itlbZYgMgUPjwQ1Lfo+DbL00md6ce11JacrEw+jJ1/KbLgguscV4=
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-