General

  • Target

    c9e1c98bf50c41cfea91996e87b89c58a84d841f17ac9c644b58aed041672f91

  • Size

    579B

  • Sample

    240906-x1swmstdrn

  • MD5

    b0374afcb3f99686fd6670eabe915587

  • SHA1

    0be4fc4d71d008541ecf41c0ad2fae791def39a2

  • SHA256

    c9e1c98bf50c41cfea91996e87b89c58a84d841f17ac9c644b58aed041672f91

  • SHA512

    0e4a6c1db1bb2cf9306c862df323b48b5f966608d610922ca2a3712b6f70c20b450a4ecfcc964dbd8a6c0c233dd9e92d8c54993b4b671b597dfdc3a02f84381a

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.mediafire.com/file_premium/yr9n4na8c113c4b/pgrt1.zip/

exe.dropper

https://www.mediafire.com/file/9bysf4vlgf7drrn/pgrt2.zip

Targets

    • Target

      c9e1c98bf50c41cfea91996e87b89c58a84d841f17ac9c644b58aed041672f91

    • Size

      579B

    • MD5

      b0374afcb3f99686fd6670eabe915587

    • SHA1

      0be4fc4d71d008541ecf41c0ad2fae791def39a2

    • SHA256

      c9e1c98bf50c41cfea91996e87b89c58a84d841f17ac9c644b58aed041672f91

    • SHA512

      0e4a6c1db1bb2cf9306c862df323b48b5f966608d610922ca2a3712b6f70c20b450a4ecfcc964dbd8a6c0c233dd9e92d8c54993b4b671b597dfdc3a02f84381a

    Score
    8/10
    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Tasks