General

  • Target

    8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5

  • Size

    79KB

  • Sample

    221023-lnbaaahfgn

  • MD5

    39de314ca12ec81359cbd1fabc12cb98

  • SHA1

    d23e18a068f0ffde1fe7dbffbfa86ef459e3ee57

  • SHA256

    8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5

  • SHA512

    67eb2a93e509ec34999f21757069d0729d06146796253e198d0449f2dfa83568a290cf7397a628a7489e2958fe61a45a387a1d3517397a79499f07ea0adfca73

  • SSDEEP

    768:ixbpML2teJsNST+jBl8UDRxz99LHy85ZKYbkr+H/l7eYk3I:+M6ZNSTOl7DR31y8eYS+H/sj

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://newyeargoka.top/read.php?f=0.dat

Targets

    • Target

      8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5

    • Size

      79KB

    • MD5

      39de314ca12ec81359cbd1fabc12cb98

    • SHA1

      d23e18a068f0ffde1fe7dbffbfa86ef459e3ee57

    • SHA256

      8ffeab678d425795e55e0328ebf9685c5e2c2ec3d5094c0d88578a10d688c5a5

    • SHA512

      67eb2a93e509ec34999f21757069d0729d06146796253e198d0449f2dfa83568a290cf7397a628a7489e2958fe61a45a387a1d3517397a79499f07ea0adfca73

    • SSDEEP

      768:ixbpML2teJsNST+jBl8UDRxz99LHy85ZKYbkr+H/l7eYk3I:+M6ZNSTOl7DR31y8eYS+H/sj

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Valyria

      Malicious Word document which is a loader for other malware.

MITRE ATT&CK Enterprise v6

Tasks