General

  • Target

    0018a2c244df7b137283524bc580239b10475ec4f60ce232f6fd2449832498db

  • Size

    34KB

  • Sample

    240801-z3cnjswfpl

  • MD5

    1a728c2b3c673aed61981cb039c5006f

  • SHA1

    fbf6dd8c3b24ca278ee76dc9f54d4c37b28609f0

  • SHA256

    0018a2c244df7b137283524bc580239b10475ec4f60ce232f6fd2449832498db

  • SHA512

    35a93e3e52d2eaefd4baf12dbe54cc33b2f3b25044c6f3b7b11e0ccb883c975b1e0b01ef331f89cd9d2c2da9f15c4337d7301e5c40985a37e696560881499c06

  • SSDEEP

    384:18LDjTPAA6ymev82NsdHLneAjf7OrN6/WgZduE:cDjLR6dev82NsdHLpf76NYW

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://tmpfiles.org/dl/10333590/exploit.jpg

Targets

    • Target

      0018a2c244df7b137283524bc580239b10475ec4f60ce232f6fd2449832498db

    • Size

      34KB

    • MD5

      1a728c2b3c673aed61981cb039c5006f

    • SHA1

      fbf6dd8c3b24ca278ee76dc9f54d4c37b28609f0

    • SHA256

      0018a2c244df7b137283524bc580239b10475ec4f60ce232f6fd2449832498db

    • SHA512

      35a93e3e52d2eaefd4baf12dbe54cc33b2f3b25044c6f3b7b11e0ccb883c975b1e0b01ef331f89cd9d2c2da9f15c4337d7301e5c40985a37e696560881499c06

    • SSDEEP

      384:18LDjTPAA6ymev82NsdHLneAjf7OrN6/WgZduE:cDjLR6dev82NsdHLpf76NYW

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Office macro that triggers on suspicious action

      Office document macro which triggers in special circumstances - often malicious.

    • Deletes itself

MITRE ATT&CK Enterprise v15

Tasks