General

  • Target

    c8812a4a2b7608578dbe76214fc1cd29b641eb3051fa3b4e61d4c23af7e88c63

  • Size

    28KB

  • Sample

    220708-yr9ngahda7

  • MD5

    2604e69479154e5d7ddc00115706ef0f

  • SHA1

    66c3a2ca32c785a3e3850354388e9259b5a8feb4

  • SHA256

    c8812a4a2b7608578dbe76214fc1cd29b641eb3051fa3b4e61d4c23af7e88c63

  • SHA512

    9d6a4d5bf57d24375e991092575ce4fcc7ffa6302adf72ff584abbc3de9d4a7b14be7cfdedfc7d2f5adf41d2268f4e8744b7d02a5eb59efda5a47d6665dea3d6

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://45.32.16.170:80/a

Targets

    • Target

      c8812a4a2b7608578dbe76214fc1cd29b641eb3051fa3b4e61d4c23af7e88c63

    • Size

      28KB

    • MD5

      2604e69479154e5d7ddc00115706ef0f

    • SHA1

      66c3a2ca32c785a3e3850354388e9259b5a8feb4

    • SHA256

      c8812a4a2b7608578dbe76214fc1cd29b641eb3051fa3b4e61d4c23af7e88c63

    • SHA512

      9d6a4d5bf57d24375e991092575ce4fcc7ffa6302adf72ff584abbc3de9d4a7b14be7cfdedfc7d2f5adf41d2268f4e8744b7d02a5eb59efda5a47d6665dea3d6

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix

Tasks