General

  • Target

    ce7d9b0734436d37674c5e9b91d67431

  • Size

    17KB

  • Sample

    221122-1bvwgsdb6z

  • MD5

    ce7d9b0734436d37674c5e9b91d67431

  • SHA1

    2ce909f8c0d4dc8b684743c4a45b335a79124e96

  • SHA256

    ed4ae4ef8a0e7a00159b884ae86154f6bf3d41a3911276eee795965735292456

  • SHA512

    ae6c4421bf9a3944b287b2266f3f184fdcba03a20a358ae25778c2f87ab09a26ac2ee66d9276303edb269f2a4313bf083693bf3673b6b7783eca2f63fee22b6b

  • SSDEEP

    384:Bnh0AtxoAKtkKERlcPNxt/ZtNNMNKuTVLa+0txyq3:BnuKuAKbSUxllNMl+ZsU

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://192.168.40.128/fund.txt

Targets

    • Target

      ce7d9b0734436d37674c5e9b91d67431

    • Size

      17KB

    • MD5

      ce7d9b0734436d37674c5e9b91d67431

    • SHA1

      2ce909f8c0d4dc8b684743c4a45b335a79124e96

    • SHA256

      ed4ae4ef8a0e7a00159b884ae86154f6bf3d41a3911276eee795965735292456

    • SHA512

      ae6c4421bf9a3944b287b2266f3f184fdcba03a20a358ae25778c2f87ab09a26ac2ee66d9276303edb269f2a4313bf083693bf3673b6b7783eca2f63fee22b6b

    • SSDEEP

      384:Bnh0AtxoAKtkKERlcPNxt/ZtNNMNKuTVLa+0txyq3:BnuKuAKbSUxllNMl+ZsU

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks