General

  • Target

    4ad7ed1ab9734ce40601e2283c3f1bb00607770c517901c322a33c41894ce720

  • Size

    56KB

  • Sample

    221128-vaj5psdh3s

  • MD5

    778ab8b6d5aace23a82e116bca639763

  • SHA1

    eae5003689ac0e66da255f20da282801f9d68037

  • SHA256

    4ad7ed1ab9734ce40601e2283c3f1bb00607770c517901c322a33c41894ce720

  • SHA512

    e323c04bc61c2d828d0c049bc570bd0139d5ef63732be4f1f999917b934ff43c10f2cde05c423193549572f9485306ae6df049bb04e1ed748d85cbb9e60bddee

  • SSDEEP

    384:Qt+LbB5ou8rEKKdlTmmyX2hWdO+sXy/lNcVySuur9m8jfxYkLZ:6+LbXoJEKlmqM+ZEyEQmxLLZ

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://185.48.56.137/ssdynamooss/sspidarss.cab

Targets

    • Target

      4ad7ed1ab9734ce40601e2283c3f1bb00607770c517901c322a33c41894ce720

    • Size

      56KB

    • MD5

      778ab8b6d5aace23a82e116bca639763

    • SHA1

      eae5003689ac0e66da255f20da282801f9d68037

    • SHA256

      4ad7ed1ab9734ce40601e2283c3f1bb00607770c517901c322a33c41894ce720

    • SHA512

      e323c04bc61c2d828d0c049bc570bd0139d5ef63732be4f1f999917b934ff43c10f2cde05c423193549572f9485306ae6df049bb04e1ed748d85cbb9e60bddee

    • SSDEEP

      384:Qt+LbB5ou8rEKKdlTmmyX2hWdO+sXy/lNcVySuur9m8jfxYkLZ:6+LbXoJEKlmqM+ZEyEQmxLLZ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks