General

  • Target

    688550d0a4a81745a0cfe173fbc6c33d

  • Size

    32KB

  • Sample

    230125-j2nfnaha81

  • MD5

    688550d0a4a81745a0cfe173fbc6c33d

  • SHA1

    c9b970d004ca1556982b25b2502054ad940e61fa

  • SHA256

    52813c7ce2ba2e547f64effc3e9737a75e77e44bd80afd66920faeeb8dfe545f

  • SHA512

    d410de32f23f7593fa6c48ef333afc6dd1921cc16dee12c7cce6b4771823c58b9c6592926b5baa7ed57ca2eaa389002934e3976a415f344941a9e2b6d871ae4f

  • SSDEEP

    192:syClLZEvA+6/6rnsqpZtgmavAcE7zDpsO9N1/J5eWA0jPUi1tu0/4QL5a:s78iSsqdg1vA97z9Z1SWA0j5tD/

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://192.168.49.82/3.5.2.1.txt

Targets

    • Target

      688550d0a4a81745a0cfe173fbc6c33d

    • Size

      32KB

    • MD5

      688550d0a4a81745a0cfe173fbc6c33d

    • SHA1

      c9b970d004ca1556982b25b2502054ad940e61fa

    • SHA256

      52813c7ce2ba2e547f64effc3e9737a75e77e44bd80afd66920faeeb8dfe545f

    • SHA512

      d410de32f23f7593fa6c48ef333afc6dd1921cc16dee12c7cce6b4771823c58b9c6592926b5baa7ed57ca2eaa389002934e3976a415f344941a9e2b6d871ae4f

    • SSDEEP

      192:syClLZEvA+6/6rnsqpZtgmavAcE7zDpsO9N1/J5eWA0jPUi1tu0/4QL5a:s78iSsqdg1vA97z9Z1SWA0j5tD/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks