General

  • Target

    b47c2bcb62480e3eac5d20262f50727906ad6d22.bin

  • Size

    178KB

  • Sample

    220124-r9wq1afag2

  • MD5

    e412b9ccba9b2ce735edc48887163060

  • SHA1

    b47c2bcb62480e3eac5d20262f50727906ad6d22

  • SHA256

    9c03f4b772b9593a0e3b4a596216fa032474f54caf1714c26ad241534732351f

  • SHA512

    d81f786f84d6897c62af9a4d6eb21c5b0496827b79dad33fd57c01064d696c28225e7da944ff7d6d5b5639390989755f43a9385cc888237ac66abb9998efb823

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://chocolatey.org/7za.exe

Targets

    • Target

      b47c2bcb62480e3eac5d20262f50727906ad6d22.bin

    • Size

      178KB

    • MD5

      e412b9ccba9b2ce735edc48887163060

    • SHA1

      b47c2bcb62480e3eac5d20262f50727906ad6d22

    • SHA256

      9c03f4b772b9593a0e3b4a596216fa032474f54caf1714c26ad241534732351f

    • SHA512

      d81f786f84d6897c62af9a4d6eb21c5b0496827b79dad33fd57c01064d696c28225e7da944ff7d6d5b5639390989755f43a9385cc888237ac66abb9998efb823

    Score
    10/10
    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v6

Tasks