General

  • Target

    603f6b609a396a112d5a90a916b640495b26049afbfdc295bee92d5a31f4376c

  • Size

    145KB

  • Sample

    221125-ltlcfacd7x

  • MD5

    2d09a7533f009b0f6cd0b9f237041761

  • SHA1

    d4438568059da8dac7c76871f575867776674a96

  • SHA256

    603f6b609a396a112d5a90a916b640495b26049afbfdc295bee92d5a31f4376c

  • SHA512

    bd6322e3baeb29ee7a86ce281f02659cc97cb188cdd70e2927c2260b74f8398b4d7e17caf5e99b2fcd3a333be89fc4de2ae50ff4186ee5a21f8cbd4b495ae767

  • SSDEEP

    1536:N81ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvadf+a96nDfPsPwSvURabL:N8GhDS0o9zTGOZD6EbzCdgDfPsIaH

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://aspiringfilms.com/lJc7Qpx

exe.dropper

http://kelvinnikkel.com/HgR

exe.dropper

http://dayofdisconnect.com/O5Le4

exe.dropper

http://joynt.net/PVP9Pn

exe.dropper

http://craftww.pl//I1Db12jC

Targets

    • Target

      603f6b609a396a112d5a90a916b640495b26049afbfdc295bee92d5a31f4376c

    • Size

      145KB

    • MD5

      2d09a7533f009b0f6cd0b9f237041761

    • SHA1

      d4438568059da8dac7c76871f575867776674a96

    • SHA256

      603f6b609a396a112d5a90a916b640495b26049afbfdc295bee92d5a31f4376c

    • SHA512

      bd6322e3baeb29ee7a86ce281f02659cc97cb188cdd70e2927c2260b74f8398b4d7e17caf5e99b2fcd3a333be89fc4de2ae50ff4186ee5a21f8cbd4b495ae767

    • SSDEEP

      1536:N81ooMDS034nC54nZrL4AkiuAMOkEEW/yEbzvadf+a96nDfPsPwSvURabL:N8GhDS0o9zTGOZD6EbzCdgDfPsIaH

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks