General

  • Target

    InstProgAll.ps1

  • Size

    10KB

  • Sample

    230719-kb3ckaad2x

  • MD5

    3bbcdac7696a52e2e883c5b438d445d7

  • SHA1

    ef24f8f37ecc3cadf3a6b63d8755d06b17641a54

  • SHA256

    5112ca9d431058b74618c66107091aac0a486bada0477d125c4a03eff4d6ed87

  • SHA512

    12629bb6791c80d9e73c58a1cf5e2c17d78edf4e122e188a2b38a54e5fe34ff8d704d8dcc24b06ee379e644986ab59064da5c7a562fc4313a9e87f1513382c2a

  • SSDEEP

    192:ep39xdTnKr9ID6U8p/pR7mSOdtyzTNXQaQGRCgP:w9xZnO9ID8phRKSUITNT3

Score
8/10

Malware Config

Targets

    • Target

      InstProgAll.ps1

    • Size

      10KB

    • MD5

      3bbcdac7696a52e2e883c5b438d445d7

    • SHA1

      ef24f8f37ecc3cadf3a6b63d8755d06b17641a54

    • SHA256

      5112ca9d431058b74618c66107091aac0a486bada0477d125c4a03eff4d6ed87

    • SHA512

      12629bb6791c80d9e73c58a1cf5e2c17d78edf4e122e188a2b38a54e5fe34ff8d704d8dcc24b06ee379e644986ab59064da5c7a562fc4313a9e87f1513382c2a

    • SSDEEP

      192:ep39xdTnKr9ID6U8p/pR7mSOdtyzTNXQaQGRCgP:w9xZnO9ID8phRKSUITNT3

    Score
    8/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks