General

  • Target

    3f1e3be90faad6ec87e3c7db24ed061fad4d2548f747b8e68a7f15c26d10a58b

  • Size

    68KB

  • Sample

    240801-z42daswfrk

  • MD5

    97db240cfb4fde1ed5afef0680b9bd77

  • SHA1

    fa58fbbbc902082a64af59ea5d693caed7eddaff

  • SHA256

    3f1e3be90faad6ec87e3c7db24ed061fad4d2548f747b8e68a7f15c26d10a58b

  • SHA512

    c9e0179f956e8c10e12f1ed9eddd324308b5c2ecab31bcb59b1a1787ddfe90bd339140ad1f394363e44cfcad7c6141071f35d2870231fcec63ceedfe5cab5682

  • SSDEEP

    1536:f9hWk3hbd9382I6/4vw+Wtu5CEUEmfgPfQ6r0DnUD/PkkSgn84lH4wpvZjkkU3J+:f9hWk3hbd9382I6/4vw+Wtu5CEUEmfgH

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://tmpfiles.org/dl/10333590/exploit.jpg

Targets

    • Target

      3f1e3be90faad6ec87e3c7db24ed061fad4d2548f747b8e68a7f15c26d10a58b

    • Size

      68KB

    • MD5

      97db240cfb4fde1ed5afef0680b9bd77

    • SHA1

      fa58fbbbc902082a64af59ea5d693caed7eddaff

    • SHA256

      3f1e3be90faad6ec87e3c7db24ed061fad4d2548f747b8e68a7f15c26d10a58b

    • SHA512

      c9e0179f956e8c10e12f1ed9eddd324308b5c2ecab31bcb59b1a1787ddfe90bd339140ad1f394363e44cfcad7c6141071f35d2870231fcec63ceedfe5cab5682

    • SSDEEP

      1536:f9hWk3hbd9382I6/4vw+Wtu5CEUEmfgPfQ6r0DnUD/PkkSgn84lH4wpvZjkkU3J+:f9hWk3hbd9382I6/4vw+Wtu5CEUEmfgH

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Office macro that triggers on suspicious action

      Office document macro which triggers in special circumstances - often malicious.

    • Deletes itself

MITRE ATT&CK Enterprise v15

Tasks