General

  • Target

    installAgent.ps1

  • Size

    5KB

  • Sample

    230721-khvw3acg52

  • MD5

    c73ae14672e82e0c28b55557e2867e62

  • SHA1

    bad14b7e2c561d0b1651f5732d7a0b7795b0de3b

  • SHA256

    9eee2cadf40bb350a094563313b2167769e625a404b09d6fec220143f418932c

  • SHA512

    c9a2cbd39562aeb6a50cd473a335eed358871374b4561649843b7695bc7b4c0c04274e6abb89c42238df33d5afc80699432c382dd6e93ff78c01b63a2247e590

  • SSDEEP

    96:5POiwV7DNGEFLV3EqcktoCadnQnT71yTmKTgD4InLRsx4T+:VObDNGOL7DadQU9kD9f+

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://agent.nigano.net:53/Windows_Agent.zip

Targets

    • Target

      installAgent.ps1

    • Size

      5KB

    • MD5

      c73ae14672e82e0c28b55557e2867e62

    • SHA1

      bad14b7e2c561d0b1651f5732d7a0b7795b0de3b

    • SHA256

      9eee2cadf40bb350a094563313b2167769e625a404b09d6fec220143f418932c

    • SHA512

      c9a2cbd39562aeb6a50cd473a335eed358871374b4561649843b7695bc7b4c0c04274e6abb89c42238df33d5afc80699432c382dd6e93ff78c01b63a2247e590

    • SSDEEP

      96:5POiwV7DNGEFLV3EqcktoCadnQnT71yTmKTgD4InLRsx4T+:VObDNGOL7DadQU9kD9f+

    Score
    8/10
    • Blocklisted process makes network request

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks