Resubmissions

07-08-2024 04:42

240807-fbybds1fkp 10

25-04-2024 11:38

240425-nrq61sac63 10

General

  • Target

    get.ps1

  • Size

    1KB

  • Sample

    240807-fbybds1fkp

  • MD5

    6185481735a459173f53a4c39bf05ced

  • SHA1

    73db56dcfb54cc4ed558f8e1ead3441b542a24e0

  • SHA256

    825fd2904145a765334671e018e98e55ec62f4d1691d562431a71df0e47d3c86

  • SHA512

    61c8c67e77aecb650eda46fecbbf436333e2fb41e63d88ee71a160528c2dddaeafdce0936ac2b8c0a7d6e9cb06d0a80bc5a330a91a936a840315724b7c8e7ecf

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://bitbucket.org/WindowsAddict/microsoft-activation-scripts/raw/984b384d9e5facc222eecaa07b78def265395321/MAS/All-In-One-Version/MAS_AIO-CRC32_8B16F764.cmd

exe.dropper

https://codeberg.org/massgravel/Microsoft-Activation-Scripts/raw/commit/984b384d9e5facc222eecaa07b78def265395321/MAS/All-In-One-Version/MAS_AIO-CRC32_8B16F764.cmd

exe.dropper

https://raw.githubusercontent.com/massgravel/Microsoft-Activation-Scripts/984b384d9e5facc222eecaa07b78def265395321/MAS/All-In-One-Version/MAS_AIO-CRC32_8B16F764.cmd

Targets

    • Target

      get.ps1

    • Size

      1KB

    • MD5

      6185481735a459173f53a4c39bf05ced

    • SHA1

      73db56dcfb54cc4ed558f8e1ead3441b542a24e0

    • SHA256

      825fd2904145a765334671e018e98e55ec62f4d1691d562431a71df0e47d3c86

    • SHA512

      61c8c67e77aecb650eda46fecbbf436333e2fb41e63d88ee71a160528c2dddaeafdce0936ac2b8c0a7d6e9cb06d0a80bc5a330a91a936a840315724b7c8e7ecf

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks for any installed AV software in registry

    • Legitimate hosting services abused for malware hosting/C2

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks