General

  • Target

    a10ce983a88fc3e8f5248d077566aeb2e06bfc9b0659cf6a5ca3716f9185f16d

  • Size

    44KB

  • Sample

    240710-12b63asfpn

  • MD5

    80c41171c577be1d459280fbfc32dcd3

  • SHA1

    547365af1c26196a9790f1822fe47b48a736d1fd

  • SHA256

    a10ce983a88fc3e8f5248d077566aeb2e06bfc9b0659cf6a5ca3716f9185f16d

  • SHA512

    0f3ca85952e083f11765e0230c840cef2db1c008c8a4f63a199f875c2b5dddc4ba929d24f056370d98cff5c3d3da872d3eb8cef71745c3c5b7391e052994fee0

  • SSDEEP

    768:qtvo+6lzak3hbdlylKsgqopeJBWhZFGkE+cL2NdAJM57WauFlmQQT0TJ9acA9ac6:C5k3hbdlylKsgqopeJBWhZFGkE+cL2NW

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://raw.githubusercontent.com/enigma0x3/Generate-Macro/master/Generate-Macro.ps1

Targets

    • Target

      a10ce983a88fc3e8f5248d077566aeb2e06bfc9b0659cf6a5ca3716f9185f16d

    • Size

      44KB

    • MD5

      80c41171c577be1d459280fbfc32dcd3

    • SHA1

      547365af1c26196a9790f1822fe47b48a736d1fd

    • SHA256

      a10ce983a88fc3e8f5248d077566aeb2e06bfc9b0659cf6a5ca3716f9185f16d

    • SHA512

      0f3ca85952e083f11765e0230c840cef2db1c008c8a4f63a199f875c2b5dddc4ba929d24f056370d98cff5c3d3da872d3eb8cef71745c3c5b7391e052994fee0

    • SSDEEP

      768:qtvo+6lzak3hbdlylKsgqopeJBWhZFGkE+cL2NdAJM57WauFlmQQT0TJ9acA9ac6:C5k3hbdlylKsgqopeJBWhZFGkE+cL2NW

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks