General

  • Target

    ba30141f7e490db648ad8e42062fd4e2b6f9eb324b4ef81063654794c244702b

  • Size

    148KB

  • Sample

    220725-f2d1fagecl

  • MD5

    d63ddec5f38f747176b48776e0134897

  • SHA1

    ce98e77025da6872502aa6c303c647ee2b5dd778

  • SHA256

    ba30141f7e490db648ad8e42062fd4e2b6f9eb324b4ef81063654794c244702b

  • SHA512

    6f5604969faef63183cb5314d26cfa0d49db70d043bb90c02bb2a08582beb14387384fcea369f5ed55dc3112ceddadf031732a4bcf46a20d60dda2247806c38c

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.andrea-alvarado.com/test/SSpxosbD/

exe.dropper

http://soafinance.com/wp-admin/fGJmODgVCE/

exe.dropper

http://filosofiya.moscow/2vx0z2/qo1xf387_mpk9z5j9-84/

exe.dropper

https://xerpsoftware.com/calendar/ZjXKtAcn/

exe.dropper

http://nasaderiksubang.top/wp-content/kuCtItoZeu/

Targets

    • Target

      ba30141f7e490db648ad8e42062fd4e2b6f9eb324b4ef81063654794c244702b

    • Size

      148KB

    • MD5

      d63ddec5f38f747176b48776e0134897

    • SHA1

      ce98e77025da6872502aa6c303c647ee2b5dd778

    • SHA256

      ba30141f7e490db648ad8e42062fd4e2b6f9eb324b4ef81063654794c244702b

    • SHA512

      6f5604969faef63183cb5314d26cfa0d49db70d043bb90c02bb2a08582beb14387384fcea369f5ed55dc3112ceddadf031732a4bcf46a20d60dda2247806c38c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks