General

  • Target

    3.ps1

  • Size

    1.1MB

  • Sample

    221003-ggypsaabe8

  • MD5

    2c1d7f30313a38d84667c62442884b8b

  • SHA1

    87a8523c468b51418acdd93ac866c4ffeb038f09

  • SHA256

    5a986b4ea7640b887fbef842e3cf0adcd6aa16482c98ccd6db5a99e726205b3a

  • SHA512

    c12f02092a9f45d3fa51d3a681d10fe6f331439783a18b05db6fc8130f62ef7a8644c84af4c0532693cd43dca9c81b96c12735c2ea7d9e28203f5e2e1c8d0755

  • SSDEEP

    12288:1ViPI6z8ay43NxSz0kmLoL2xfZe0I8nU8ECxKFajz:PINi0kmLF5I8z

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    107.182.129.168
  • Port:
    21
  • Username:
    ashgdhfg3
  • Password:
    jfghfjgh545

Targets

    • Target

      3.ps1

    • Size

      1.1MB

    • MD5

      2c1d7f30313a38d84667c62442884b8b

    • SHA1

      87a8523c468b51418acdd93ac866c4ffeb038f09

    • SHA256

      5a986b4ea7640b887fbef842e3cf0adcd6aa16482c98ccd6db5a99e726205b3a

    • SHA512

      c12f02092a9f45d3fa51d3a681d10fe6f331439783a18b05db6fc8130f62ef7a8644c84af4c0532693cd43dca9c81b96c12735c2ea7d9e28203f5e2e1c8d0755

    • SSDEEP

      12288:1ViPI6z8ay43NxSz0kmLoL2xfZe0I8nU8ECxKFajz:PINi0kmLF5I8z

    Score
    10/10
    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Collection

Email Collection

1
T1114

Tasks