General

  • Target

    Orbit.exe

  • Size

    2.2MB

  • Sample

    240521-sa44rshg27

  • MD5

    6e229ef8a47b4ef6c3cd39eef4b8cd61

  • SHA1

    4fde31b5a4a0a48115da43ab54116a282545902f

  • SHA256

    161af17c16ca786b6f2836421d11085a551d7678cb018fd929926729d08af2b8

  • SHA512

    35513e19f349277e500992da1da88ae98343e900be148a5309afec282b28c00aa02dc491cd3e6ce5290bdeb6322517ea7818d8c28c2d7e696af448ee5967c9ed

  • SSDEEP

    49152:gfNBnwzhM8t4dlOawoQ67Go+H34mxXTH8VyZK3LnP2lL:vXTcL4L

Score
8/10

Malware Config

Targets

    • Target

      Orbit.exe

    • Size

      2.2MB

    • MD5

      6e229ef8a47b4ef6c3cd39eef4b8cd61

    • SHA1

      4fde31b5a4a0a48115da43ab54116a282545902f

    • SHA256

      161af17c16ca786b6f2836421d11085a551d7678cb018fd929926729d08af2b8

    • SHA512

      35513e19f349277e500992da1da88ae98343e900be148a5309afec282b28c00aa02dc491cd3e6ce5290bdeb6322517ea7818d8c28c2d7e696af448ee5967c9ed

    • SSDEEP

      49152:gfNBnwzhM8t4dlOawoQ67Go+H34mxXTH8VyZK3LnP2lL:vXTcL4L

    Score
    8/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks