General

  • Target

    c762755fd2ed7c90468fc3818e18e82cbfd79c04be9f0ff72b1f33628caa58e0

  • Size

    16KB

  • Sample

    221130-sqb3xsbf43

  • MD5

    69323a5d105ac45e693296ef861edf57

  • SHA1

    6438002c58853c5cfd3b02a003ab0f114c8710c7

  • SHA256

    c762755fd2ed7c90468fc3818e18e82cbfd79c04be9f0ff72b1f33628caa58e0

  • SHA512

    ae3bb0353d0ed65c019c5ef100bb75ded5e0b9854ddee69b4f7d7b3f71a0f2d50cdc8e4e600de8eba84caf2a437752cfc5135a9e1fc8d5273c7f307dd95fa612

  • SSDEEP

    384:Lka8qJPfp3b0vWeRJJiHaEEmDNC9vj/3Fax:3XgWeRJJijEhb/Fo

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://fast-cargo.com/images/file/78.exe

Targets

    • Target

      c762755fd2ed7c90468fc3818e18e82cbfd79c04be9f0ff72b1f33628caa58e0

    • Size

      16KB

    • MD5

      69323a5d105ac45e693296ef861edf57

    • SHA1

      6438002c58853c5cfd3b02a003ab0f114c8710c7

    • SHA256

      c762755fd2ed7c90468fc3818e18e82cbfd79c04be9f0ff72b1f33628caa58e0

    • SHA512

      ae3bb0353d0ed65c019c5ef100bb75ded5e0b9854ddee69b4f7d7b3f71a0f2d50cdc8e4e600de8eba84caf2a437752cfc5135a9e1fc8d5273c7f307dd95fa612

    • SSDEEP

      384:Lka8qJPfp3b0vWeRJJiHaEEmDNC9vj/3Fax:3XgWeRJJijEhb/Fo

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks