General

  • Target

    739add20d743a8d00b6fc26c0e0985b6876748fe5fee82b81c62b49cb151f571

  • Size

    127KB

  • Sample

    220625-c99kjadef4

  • MD5

    ebdde483075c4e4989d66aa8d905204a

  • SHA1

    8dbdc9875fce1de0bd61ce33a10b4a3d14bd8e31

  • SHA256

    739add20d743a8d00b6fc26c0e0985b6876748fe5fee82b81c62b49cb151f571

  • SHA512

    2511b413f089d4c9805d42f6290df49000d850e1ee4d1bada66b8fa93a53ebceb4befc1d5a05504ed1d47b59e823f3a9cbe3850588303ac005369e13d89409f4

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://overcreative.com/css/shecgesia_cjtf7s6-2586658720/

exe.dropper

http://antonresidential.com/wkdrlk/papkaa17/NujUJetNy/

exe.dropper

http://gawaher-services.com/nngb24y/vXGApWUwd/

exe.dropper

http://thepropertydealerz.com/cgi-bin/5ze7vs_tgt6e3k-5/

exe.dropper

http://guimaraesconstrutorasjc.com.br/wp-content/NTlTZtAUB/

Targets

    • Target

      739add20d743a8d00b6fc26c0e0985b6876748fe5fee82b81c62b49cb151f571

    • Size

      127KB

    • MD5

      ebdde483075c4e4989d66aa8d905204a

    • SHA1

      8dbdc9875fce1de0bd61ce33a10b4a3d14bd8e31

    • SHA256

      739add20d743a8d00b6fc26c0e0985b6876748fe5fee82b81c62b49cb151f571

    • SHA512

      2511b413f089d4c9805d42f6290df49000d850e1ee4d1bada66b8fa93a53ebceb4befc1d5a05504ed1d47b59e823f3a9cbe3850588303ac005369e13d89409f4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks