General

  • Target

    ΠΡΟΦΟΡΜΑ ΤΙΜΟΛΟΓΙΟ- 47584.xlsx

  • Size

    755KB

  • Sample

    221123-pdq5jabb25

  • MD5

    05b22b58303ffdf7c74de397fb188836

  • SHA1

    e4ad512d6d1083d758b14926bc380c048f429e9e

  • SHA256

    b56e2d3d736380f33f32ab158309146a318c41039119abd4b64c45c57f3078e9

  • SHA512

    763ad24cfa53fa7435f9426ad0949b837d5cb5eefaed5a6ba4be09e279f96a8d6bac11b511a649f3280ded13c02043b7abe13bc51f88bc3c5af2b8d5a66cbd0c

  • SSDEEP

    12288:IROo3SiPbBAFZz+yioSnTP62VdZSQZL7tjibfVbzHZD9veF8J7nMmPqcs+ACXzbE:I4onPbBAFliFPr3jiLxHTvzccKCXzbzg

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://4.204.233.44/DLL/NoStartUp.ppam

Targets

    • Target

      ΠΡΟΦΟΡΜΑ ΤΙΜΟΛΟΓΙΟ- 47584.xlsx

    • Size

      755KB

    • MD5

      05b22b58303ffdf7c74de397fb188836

    • SHA1

      e4ad512d6d1083d758b14926bc380c048f429e9e

    • SHA256

      b56e2d3d736380f33f32ab158309146a318c41039119abd4b64c45c57f3078e9

    • SHA512

      763ad24cfa53fa7435f9426ad0949b837d5cb5eefaed5a6ba4be09e279f96a8d6bac11b511a649f3280ded13c02043b7abe13bc51f88bc3c5af2b8d5a66cbd0c

    • SSDEEP

      12288:IROo3SiPbBAFZz+yioSnTP62VdZSQZL7tjibfVbzHZD9veF8J7nMmPqcs+ACXzbE:I4onPbBAFliFPr3jiLxHTvzccKCXzbzg

    Score
    10/10
    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks