General

  • Target

    b125f728606a734549dfc8145d64725109c9376445845c6ceb5cf2c5d65e77af

  • Size

    115KB

  • Sample

    220724-zas5tsfehj

  • MD5

    98521917f7bf7bc35e47153473ba0400

  • SHA1

    a8a030ec5d992a1e9f022c75f904feae6d8d6199

  • SHA256

    b125f728606a734549dfc8145d64725109c9376445845c6ceb5cf2c5d65e77af

  • SHA512

    550f1fe8ded1d2be815555c56d97daccac1af136c4e73d09443f3156ac60ef0aa26efef49626b724fe31182da413ca43dcd99c217d51987f62c44bbf2fc5df76

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://blog.laviajeria.com/wp-content/uploads/bsANkVbt/

exe.dropper

http://soprofissional.com.br/moodle/AmMwSGECn/

exe.dropper

http://brkcakiroglu.com/wp/wl3z8af_3urbpa-13949/

exe.dropper

http://trainingenterprise.com.mx/wp/un7i_igf5j-005504691/

exe.dropper

http://mothershelpers.net/wp/OaQzFVJN/

Targets

    • Target

      b125f728606a734549dfc8145d64725109c9376445845c6ceb5cf2c5d65e77af

    • Size

      115KB

    • MD5

      98521917f7bf7bc35e47153473ba0400

    • SHA1

      a8a030ec5d992a1e9f022c75f904feae6d8d6199

    • SHA256

      b125f728606a734549dfc8145d64725109c9376445845c6ceb5cf2c5d65e77af

    • SHA512

      550f1fe8ded1d2be815555c56d97daccac1af136c4e73d09443f3156ac60ef0aa26efef49626b724fe31182da413ca43dcd99c217d51987f62c44bbf2fc5df76

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks