General

  • Target

    26c6ac7761d2defcdab10bd02937e2d903b0bb15923bb3f967d973eed980f3f8

  • Size

    150KB

  • Sample

    240930-1vtgrs1cpf

  • MD5

    2d724d418abc864cf35c732b2f47a004

  • SHA1

    a58cf7ca5a1611461ed4a1cd72714594e922f41b

  • SHA256

    26c6ac7761d2defcdab10bd02937e2d903b0bb15923bb3f967d973eed980f3f8

  • SHA512

    64945e4f7ee3c7e82694a2bab71058cc19fdcd4be7ed7c2457c8f6ddf2ed84dc0434e07502c4e04b79000a97e2ad8babcf07d066cc38393501825737e2cbc27a

  • SSDEEP

    3072:McKoSsxzNDZLDZjlbR868O8KlVH3dehvMqAPjxO5xyZUE5V5xtezEVg8/dgzGx0W:McKoSsxzNDZLDZjlbR868O8KlVH3deh

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://actividades.laforetlanguages.com/wp-admin/BlkdOKDXL/

exe.dropper

http://sbcopylive.com.br/rjuz/w/

exe.dropper

https://trasix.com/wp-admin/y5Aa1jt0Sp2Qk/

exe.dropper

https://www.parkinsons.co.in/abc/Y6Y0fTbUEg6/

exe.dropper

https://biz.merlin.ua/wp-admin/W6agtFSRZGt371dV/

exe.dropper

http://bruckevn.site/3yztzzvh/nmY4wZfbYL/

exe.dropper

https://pardiskood.com/wp-content/NR/

exe.dropper

https://daujimaharajmandir.org/wp-includes/63De/

exe.dropper

https://datasits.com/wp-includes/Zkj4QO/

exe.dropper

https://anugerahmasinternasional.co.id/wp-admin/SJbxE5I/

exe.dropper

https://atmedic.cl/sistemas/3ZbsUAU/

exe.dropper

https://anwaralbasateen.com/Fox-C404/mDHkfgebMRzmGKBy/

Targets

    • Target

      26c6ac7761d2defcdab10bd02937e2d903b0bb15923bb3f967d973eed980f3f8

    • Size

      150KB

    • MD5

      2d724d418abc864cf35c732b2f47a004

    • SHA1

      a58cf7ca5a1611461ed4a1cd72714594e922f41b

    • SHA256

      26c6ac7761d2defcdab10bd02937e2d903b0bb15923bb3f967d973eed980f3f8

    • SHA512

      64945e4f7ee3c7e82694a2bab71058cc19fdcd4be7ed7c2457c8f6ddf2ed84dc0434e07502c4e04b79000a97e2ad8babcf07d066cc38393501825737e2cbc27a

    • SSDEEP

      3072:McKoSsxzNDZLDZjlbR868O8KlVH3dehvMqAPjxO5xyZUE5V5xtezEVg8/dgzGx0W:McKoSsxzNDZLDZjlbR868O8KlVH3deh

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks