General

  • Target

    e00b1af2bd049558b15f6c217524189501acfbedee80d1e02921eca7706fab4c

  • Size

    70KB

  • Sample

    221125-nlhyfsgg6v

  • MD5

    7a9018df7e4cde2acb0737a070dbe519

  • SHA1

    c789cc7e2ac8cf7ad980f7bccdfdd2387882c541

  • SHA256

    e00b1af2bd049558b15f6c217524189501acfbedee80d1e02921eca7706fab4c

  • SHA512

    d3572392f3d933ba4cd5861d65cb4ef31d9b54f2f209d96e77e6c1780d939e59c266a1f2dbbbb6149f812370a991ba3038b6f830930a0719d25cc63c43ab6dcf

  • SSDEEP

    768:aDzj4Obrw0lWN+0Mdnn2RX0wRtvxkZhlkLk2buRRV1ij3BVeyzBcawx7+elWjZxw:Szji0lWzMB8/xxDbue9BBSyZxV

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://23.95.23.202/v9y.exe

Targets

    • Target

      e00b1af2bd049558b15f6c217524189501acfbedee80d1e02921eca7706fab4c

    • Size

      70KB

    • MD5

      7a9018df7e4cde2acb0737a070dbe519

    • SHA1

      c789cc7e2ac8cf7ad980f7bccdfdd2387882c541

    • SHA256

      e00b1af2bd049558b15f6c217524189501acfbedee80d1e02921eca7706fab4c

    • SHA512

      d3572392f3d933ba4cd5861d65cb4ef31d9b54f2f209d96e77e6c1780d939e59c266a1f2dbbbb6149f812370a991ba3038b6f830930a0719d25cc63c43ab6dcf

    • SSDEEP

      768:aDzj4Obrw0lWN+0Mdnn2RX0wRtvxkZhlkLk2buRRV1ij3BVeyzBcawx7+elWjZxw:Szji0lWzMB8/xxDbue9BBSyZxV

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks