General
-
Target
967bc4076a447dfd7f1bbd07c25ed555f6e831cc5ee6111a61563863b58e27d0.js
-
Size
199KB
-
Sample
250215-egalvatqbq
-
MD5
d730a8e5aa754e3ead0177d8e382077b
-
SHA1
f49626e9fc39f17f096d601b65c0e231c42f4cf5
-
SHA256
967bc4076a447dfd7f1bbd07c25ed555f6e831cc5ee6111a61563863b58e27d0
-
SHA512
cc913d5b0b9e30aa9ed4a25d3a429c19cf36d0fc1dda0342915098cd39cb1e06a05fd408a7165029c510ff500cea6f7befc4baf6e1e44d2ed2048d9786f4df68
-
SSDEEP
3072:eQa4mxi9huKa5yaDGx6FCIDl4xMSzGOn+isW/3B6HVHPsZw4:eQa4mx2M5IxsjBivGOn+iRoi
Static task
static1
Behavioral task
behavioral1
Sample
967bc4076a447dfd7f1bbd07c25ed555f6e831cc5ee6111a61563863b58e27d0.js
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
967bc4076a447dfd7f1bbd07c25ed555f6e831cc5ee6111a61563863b58e27d0.js
-
Size
199KB
-
MD5
d730a8e5aa754e3ead0177d8e382077b
-
SHA1
f49626e9fc39f17f096d601b65c0e231c42f4cf5
-
SHA256
967bc4076a447dfd7f1bbd07c25ed555f6e831cc5ee6111a61563863b58e27d0
-
SHA512
cc913d5b0b9e30aa9ed4a25d3a429c19cf36d0fc1dda0342915098cd39cb1e06a05fd408a7165029c510ff500cea6f7befc4baf6e1e44d2ed2048d9786f4df68
-
SSDEEP
3072:eQa4mxi9huKa5yaDGx6FCIDl4xMSzGOn+isW/3B6HVHPsZw4:eQa4mx2M5IxsjBivGOn+iRoi
-
Strrat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1