General

  • Target

    e6ac3c41451054e89fd7e1801c7ed61707311e8b5fe966cc15891173e9ea83f4

  • Size

    371KB

  • Sample

    240904-1mwl6axamr

  • MD5

    ce577683937aeb2bbc1134b983df4717

  • SHA1

    9b4fb7208127aeea38daeda9f4f65d485f972cad

  • SHA256

    e6ac3c41451054e89fd7e1801c7ed61707311e8b5fe966cc15891173e9ea83f4

  • SHA512

    0f35fb3e12ca5053eb7b5b38e30438d4989a8d6b50e7140a2b588497862bd692ea1506d6e2f25c6651808d725af383ea57b31a7acdfb398dd779cd5463b14eb7

  • SSDEEP

    6144:DjWpA+RqqVOMhdv2WY8hNduZYoFzFN0/5DC5GFvVxUX9eCnlAynPyEYT4c9r33iI:D6tOMzOH8ZoFzUOcFvwX9eepPZm4c9T/

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://3.64.251.139/v3/2/Requests07520000652.exe

Targets

    • Target

      e6ac3c41451054e89fd7e1801c7ed61707311e8b5fe966cc15891173e9ea83f4

    • Size

      371KB

    • MD5

      ce577683937aeb2bbc1134b983df4717

    • SHA1

      9b4fb7208127aeea38daeda9f4f65d485f972cad

    • SHA256

      e6ac3c41451054e89fd7e1801c7ed61707311e8b5fe966cc15891173e9ea83f4

    • SHA512

      0f35fb3e12ca5053eb7b5b38e30438d4989a8d6b50e7140a2b588497862bd692ea1506d6e2f25c6651808d725af383ea57b31a7acdfb398dd779cd5463b14eb7

    • SSDEEP

      6144:DjWpA+RqqVOMhdv2WY8hNduZYoFzFN0/5DC5GFvVxUX9eCnlAynPyEYT4c9r33iI:D6tOMzOH8ZoFzUOcFvwX9eepPZm4c9T/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Deletes itself

MITRE ATT&CK Enterprise v15

Tasks