General

  • Target

    Payment Bank datils.docx

  • Size

    22KB

  • Sample

    231127-jgzcesfb74

  • MD5

    751c33f490f58a8cf08f547a10021ffd

  • SHA1

    69963ab2e390bf35e5ff9a4c94a170f23acdf096

  • SHA256

    7f24742114fe32be839bd4df96c91475a84933da9f180afe4b869c25591f1a65

  • SHA512

    e0ff9d6b7a9eb7130501ea1b1fc0bf5b89e449d64ea9b2ab91fb127f78a48f5676d31f0328a97d97e6bec0ac4c345d7bcd97b3a1e920cd7396f0c9ef93225af9

  • SSDEEP

    384:LP81lPCsZPDPwaPnG6f59UORfqNy4Y0Fivd7ZMM4EUS9rDhCl0mppOOP1+DPJ88m:I1LomfsRYKiAMx9Xg0mp7/Uo

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://uploaddeimagens.com.br/images/004/674/364/original/vbsss.jpg?1700999331

exe.dropper

https://uploaddeimagens.com.br/images/004/674/364/original/vbsss.jpg?1700999331

Targets

    • Target

      Payment Bank datils.docx

    • Size

      22KB

    • MD5

      751c33f490f58a8cf08f547a10021ffd

    • SHA1

      69963ab2e390bf35e5ff9a4c94a170f23acdf096

    • SHA256

      7f24742114fe32be839bd4df96c91475a84933da9f180afe4b869c25591f1a65

    • SHA512

      e0ff9d6b7a9eb7130501ea1b1fc0bf5b89e449d64ea9b2ab91fb127f78a48f5676d31f0328a97d97e6bec0ac4c345d7bcd97b3a1e920cd7396f0c9ef93225af9

    • SSDEEP

      384:LP81lPCsZPDPwaPnG6f59UORfqNy4Y0Fivd7ZMM4EUS9rDhCl0mppOOP1+DPJ88m:I1LomfsRYKiAMx9Xg0mp7/Uo

    Score
    10/10
    • Blocklisted process makes network request

    • Abuses OpenXML format to download file from external location

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks