General

  • Target

    PO-4501336854_WJO-003.xlam

  • Size

    677KB

  • Sample

    231011-nt8h3scf71

  • MD5

    45e27ac07546c007b19cda8493526734

  • SHA1

    be9333c7c5dabac149a105a6c644cd68e07b6b01

  • SHA256

    1c83e7c291e828901ec5d1c627e00633385842e6c8b3f6905fc8c5194e97715e

  • SHA512

    c2c177e18bd3592a3b3d67f8246398e89f8b1fa59fc203d0c420599083454ad3310df6a30307c59044033ba5ce41158299ff35c56a7d5680a21396a5ea3ade7f

  • SSDEEP

    12288:cF4FVPB6ck2FJAKSigdXxz5Ks2/EbyRyOYLUnKLS6Ff+eIBAGP9Z+5XLAto7DH:iwFJpS9xzKs2sbyRBYtSBrVZgko3H

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937

exe.dropper

https://uploaddeimagens.com.br/images/004/616/609/original/rump_vbs.jpg?1695408937

Targets

    • Target

      PO-4501336854_WJO-003.xlam

    • Size

      677KB

    • MD5

      45e27ac07546c007b19cda8493526734

    • SHA1

      be9333c7c5dabac149a105a6c644cd68e07b6b01

    • SHA256

      1c83e7c291e828901ec5d1c627e00633385842e6c8b3f6905fc8c5194e97715e

    • SHA512

      c2c177e18bd3592a3b3d67f8246398e89f8b1fa59fc203d0c420599083454ad3310df6a30307c59044033ba5ce41158299ff35c56a7d5680a21396a5ea3ade7f

    • SSDEEP

      12288:cF4FVPB6ck2FJAKSigdXxz5Ks2/EbyRyOYLUnKLS6Ff+eIBAGP9Z+5XLAto7DH:iwFJpS9xzKs2sbyRBYtSBrVZgko3H

    Score
    10/10
    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks