General

  • Target

    P.O no. MGE-WJO 900622023.doc

  • Size

    256KB

  • Sample

    230510-xgb4sabe5t

  • MD5

    3424cfffafbf86f25d6164cb52241760

  • SHA1

    d1a18db163281b84c296e4d10c1ce175a0ab3769

  • SHA256

    515763f1332d79dd6fee5b07406230ba63985a00f4c68002480c2ffc9eaa4e2f

  • SHA512

    e71dced2ecede284e8351afaf8bf26868e7e324411fc4516386f0d8c111e59131efd82963f7a3f7cae5bcda8d983a76f396cdaee894ce560f31eef567f40008f

  • SSDEEP

    3072:GLQg8/QZrZhrVOY2VaCMPyabGFhWLMaxYzLfm0qsq:GP8YNrVJ28CMPdGFhaMayfmln

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://172.174.176.153/dll/new_rump_vb.net.txt

Targets

    • Target

      P.O no. MGE-WJO 900622023.doc

    • Size

      256KB

    • MD5

      3424cfffafbf86f25d6164cb52241760

    • SHA1

      d1a18db163281b84c296e4d10c1ce175a0ab3769

    • SHA256

      515763f1332d79dd6fee5b07406230ba63985a00f4c68002480c2ffc9eaa4e2f

    • SHA512

      e71dced2ecede284e8351afaf8bf26868e7e324411fc4516386f0d8c111e59131efd82963f7a3f7cae5bcda8d983a76f396cdaee894ce560f31eef567f40008f

    • SSDEEP

      3072:GLQg8/QZrZhrVOY2VaCMPyabGFhWLMaxYzLfm0qsq:GP8YNrVJ28CMPdGFhaMayfmln

    Score
    10/10
    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks