General

  • Target

    f1d1c93ba65f0593f2c5a26f8661ca3f42ae2331f5eb97911aac8f5dbf3d4011

  • Size

    58KB

  • Sample

    240410-r9gbbafa4y

  • MD5

    616ef8b1c8e9258511905b37029d5a42

  • SHA1

    fa62e7df0cc1ece81ba2228cc22be01214cab2ab

  • SHA256

    f1d1c93ba65f0593f2c5a26f8661ca3f42ae2331f5eb97911aac8f5dbf3d4011

  • SHA512

    79bf89fa545325810831541d76cb5b9ae7695cd7ae9eefb108bf396d1f79c5437987aa41fa342e60b1390036ae6ba4d280c7d6946dfd9c33791d7da8f8e6396d

  • SSDEEP

    768:WPKiEo5D9iF7gWMsdMVkOf11cdqS1+ODtxz99oinZ:WdE8D9iF7gWMsdlO91cdqSpDt3

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://3237.site/test01.exe

Targets

    • Target

      f1d1c93ba65f0593f2c5a26f8661ca3f42ae2331f5eb97911aac8f5dbf3d4011

    • Size

      58KB

    • MD5

      616ef8b1c8e9258511905b37029d5a42

    • SHA1

      fa62e7df0cc1ece81ba2228cc22be01214cab2ab

    • SHA256

      f1d1c93ba65f0593f2c5a26f8661ca3f42ae2331f5eb97911aac8f5dbf3d4011

    • SHA512

      79bf89fa545325810831541d76cb5b9ae7695cd7ae9eefb108bf396d1f79c5437987aa41fa342e60b1390036ae6ba4d280c7d6946dfd9c33791d7da8f8e6396d

    • SSDEEP

      768:WPKiEo5D9iF7gWMsdMVkOf11cdqS1+ODtxz99oinZ:WdE8D9iF7gWMsdlO91cdqSpDt3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks