General

  • Target

    d328ceac71beead36034d6f74671a84c197cf2fa9e2155885aa720363045eb0e

  • Size

    46KB

  • Sample

    221126-g7qrvshb53

  • MD5

    4a132e0c7a110968d3aeac60c744b05a

  • SHA1

    03eb47faef6e629e500cb417c541c153f4a77b62

  • SHA256

    d328ceac71beead36034d6f74671a84c197cf2fa9e2155885aa720363045eb0e

  • SHA512

    9cb47452b5593c1713c831de55347ac9ae67d8e990832cbb4dfedec112d65827d0694f84b51c32e206e3d6d5c2baac6813d7da6a81727d3a6b4714d8e09f17fc

  • SSDEEP

    768:6aJyq/7FoVZCAVQvLJ5QjQMqZgILnnjJ02X4zGmbyCUFJ57Q2Hsw8PwlV:6aJyya/5evn6jqZgent02X8L4jtHqP6

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://162.243.234.167:8080/gr/4.exe

Targets

    • Target

      d328ceac71beead36034d6f74671a84c197cf2fa9e2155885aa720363045eb0e

    • Size

      46KB

    • MD5

      4a132e0c7a110968d3aeac60c744b05a

    • SHA1

      03eb47faef6e629e500cb417c541c153f4a77b62

    • SHA256

      d328ceac71beead36034d6f74671a84c197cf2fa9e2155885aa720363045eb0e

    • SHA512

      9cb47452b5593c1713c831de55347ac9ae67d8e990832cbb4dfedec112d65827d0694f84b51c32e206e3d6d5c2baac6813d7da6a81727d3a6b4714d8e09f17fc

    • SSDEEP

      768:6aJyq/7FoVZCAVQvLJ5QjQMqZgILnnjJ02X4zGmbyCUFJ57Q2Hsw8PwlV:6aJyya/5evn6jqZgent02X8L4jtHqP6

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks