General

  • Target

    3518e0ea1d12fb7270840ccf51ea7e12.bin

  • Size

    10KB

  • Sample

    230127-p35dfsag42

  • MD5

    ae227bf742914f986a2bb85898d89c8c

  • SHA1

    9a37c00eb4cf268d11906464dfa026c497b7e236

  • SHA256

    6ae3d5292c0a64d952984a542c8098056d97150668f2c8c0b35d201bea788af0

  • SHA512

    b7e75ef73104a88c3fce9fa4913ea34a8d8e8f7d9b7910d0d29bec428772e9c7c189dcc319a32efde7f5171b7d9ee2ae30256097632f77910df07053c21f08f9

  • SSDEEP

    192:Po8nj1IOTQy9xETCqErYjGFz9OaoChTJ1BaX2HYQer9SoAffEeo3NsJ2yCQfd/Gk:wK1I7nCqA9OEhNaX24Q3oblJkFek

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://filebin.net/ivlin4meff64uwk7/nodeffender.exe

Targets

    • Target

      6301c7185aeb51cc2bf3eb5840b1af2a6491dc9447628e7b371e8639a62bf64f.xls

    • Size

      31KB

    • MD5

      3518e0ea1d12fb7270840ccf51ea7e12

    • SHA1

      e90eaadc59e9c50c0d8a263ad3f5b919c4cf9105

    • SHA256

      6301c7185aeb51cc2bf3eb5840b1af2a6491dc9447628e7b371e8639a62bf64f

    • SHA512

      19c2f93daed38927a0ab2040e355dbc5f222c9e8ebe961b87c858ec6e65b8bf4731fea6a670173631b5359972d0806162e9aed1a28a70f3252396f8e2c6fe6f2

    • SSDEEP

      768:WUck3hOdsylKlgryzc4bNhZFGzE+cL2knAJ6OiCsJdjcrwQ70LSijx:sk3hOdsylKlgryzc4bNhZFGzE+cL2knB

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks