General

  • Target

    c71fe9a28322bf05d103d0511ba3f4d1

  • Size

    29KB

  • Sample

    230125-j2n27afd34

  • MD5

    c71fe9a28322bf05d103d0511ba3f4d1

  • SHA1

    7d1381ab3548a3daae100047a2f266bb2da7bacc

  • SHA256

    9c69d436b16cd108734afa5110abffd876646cc9ee14262ea0852eaa1147ca6b

  • SHA512

    14ad05627931ff29ea10d5fd586906c3ceec6786c2b8eae4e3e28bd47c7d65fbf294aec34a575fd906592e3e209e5443cd14ee85e5a7efed4f048d8278f6df04

  • SSDEEP

    192:orTClLZEvA+6/6rupx+uh9eMFOsjbT/tlquvA0jUzUS0tLcrIAa:orq8iSupx+YeMUinvA0jmqtU

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://192.168.49.82/3.5.2.1.ps1

Targets

    • Target

      c71fe9a28322bf05d103d0511ba3f4d1

    • Size

      29KB

    • MD5

      c71fe9a28322bf05d103d0511ba3f4d1

    • SHA1

      7d1381ab3548a3daae100047a2f266bb2da7bacc

    • SHA256

      9c69d436b16cd108734afa5110abffd876646cc9ee14262ea0852eaa1147ca6b

    • SHA512

      14ad05627931ff29ea10d5fd586906c3ceec6786c2b8eae4e3e28bd47c7d65fbf294aec34a575fd906592e3e209e5443cd14ee85e5a7efed4f048d8278f6df04

    • SSDEEP

      192:orTClLZEvA+6/6rupx+uh9eMFOsjbT/tlquvA0jUzUS0tLcrIAa:orq8iSupx+YeMUinvA0jmqtU

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks