General

  • Target

    049f8f402af29fcb09cd552b03eb23ee678428634920a2acd7096e646054d598

  • Size

    53KB

  • Sample

    221125-1jm6lsgg73

  • MD5

    e1c4c3d995941a2e164f01d9de516651

  • SHA1

    61d0086d0407ca77f3f7bb40c6c97cf192171412

  • SHA256

    049f8f402af29fcb09cd552b03eb23ee678428634920a2acd7096e646054d598

  • SHA512

    f4dac25644f0f1db1e236719809f1ebb72ad9b4bc17064a6f25aa6855c5fdbbfa9ede6f686175cc8506e48080f4ff5484437fb32e5f059f28483bf15a384d15b

  • SSDEEP

    384:uaTW05U6z7a3ckIEuUOFB53oIw8QTisMjPHWba/Jf5U3ySBadi+AHtnaCIBrGZ0L:Zi+Z0mHW2laH+aaZBmEx7vd

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://136.243.237.222:8080/hhacz45a/mnnmz.php

Targets

    • Target

      049f8f402af29fcb09cd552b03eb23ee678428634920a2acd7096e646054d598

    • Size

      53KB

    • MD5

      e1c4c3d995941a2e164f01d9de516651

    • SHA1

      61d0086d0407ca77f3f7bb40c6c97cf192171412

    • SHA256

      049f8f402af29fcb09cd552b03eb23ee678428634920a2acd7096e646054d598

    • SHA512

      f4dac25644f0f1db1e236719809f1ebb72ad9b4bc17064a6f25aa6855c5fdbbfa9ede6f686175cc8506e48080f4ff5484437fb32e5f059f28483bf15a384d15b

    • SSDEEP

      384:uaTW05U6z7a3ckIEuUOFB53oIw8QTisMjPHWba/Jf5U3ySBadi+AHtnaCIBrGZ0L:Zi+Z0mHW2laH+aaZBmEx7vd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks