General

  • Target

    7ba4185afb16c7ca54fbb488a2d19e55825a3de688baed1d5497964711edd199

  • Size

    25KB

  • Sample

    221125-1jl9bagg69

  • MD5

    f1c80a738722554b91452c59adb2f27d

  • SHA1

    a768bd41c189e9304d17c7dbf697a1d04971d441

  • SHA256

    7ba4185afb16c7ca54fbb488a2d19e55825a3de688baed1d5497964711edd199

  • SHA512

    e31c0e292abe32777190475267897a6ffac2c1613971a33c3fe28a66e6c33f03b41bfaf9092a1db2d45618d2c7edd8339c10ef92fe784e4c993bd8533d0f2600

  • SSDEEP

    192:1Ha439gyLPUV+/T/D/Ns0+PKY1l6Lpb9KX+lTf5eKIHiZyFwDRa:A+Lb60+eh9iefY

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://92.63.87.40/aksjdderwd/asdbwk/dhoei.exe

Targets

    • Target

      7ba4185afb16c7ca54fbb488a2d19e55825a3de688baed1d5497964711edd199

    • Size

      25KB

    • MD5

      f1c80a738722554b91452c59adb2f27d

    • SHA1

      a768bd41c189e9304d17c7dbf697a1d04971d441

    • SHA256

      7ba4185afb16c7ca54fbb488a2d19e55825a3de688baed1d5497964711edd199

    • SHA512

      e31c0e292abe32777190475267897a6ffac2c1613971a33c3fe28a66e6c33f03b41bfaf9092a1db2d45618d2c7edd8339c10ef92fe784e4c993bd8533d0f2600

    • SSDEEP

      192:1Ha439gyLPUV+/T/D/Ns0+PKY1l6Lpb9KX+lTf5eKIHiZyFwDRa:A+Lb60+eh9iefY

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks