Resubmissions

03-10-2024 18:00

241003-wlb4xasdnd 10

04-09-2024 12:18

240904-pgn5ca1drd 10

General

  • Target

    Dropper.bat

  • Size

    470B

  • Sample

    241003-wlb4xasdnd

  • MD5

    8073ff57f855d5cd51346f011933d9fb

  • SHA1

    d24fc282fb660945b87e1c41860a031f6e7ec9f6

  • SHA256

    6bce98ce8751d6f87e97578a05e606a0b699f24c1a69b96cd28ef88d4984fe71

  • SHA512

    9f2e04c4f8bdeab0e2075b5bc42edbe6a9ee4221fbf1ebbacd44238576e77f7b2d5f5d3ac90d433b8b6f5493fef51747405e14a5aa2cf59a4663b2cf385b4610

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://master-repogen.vercel.app/file/server.scr

Targets

    • Target

      Dropper.bat

    • Size

      470B

    • MD5

      8073ff57f855d5cd51346f011933d9fb

    • SHA1

      d24fc282fb660945b87e1c41860a031f6e7ec9f6

    • SHA256

      6bce98ce8751d6f87e97578a05e606a0b699f24c1a69b96cd28ef88d4984fe71

    • SHA512

      9f2e04c4f8bdeab0e2075b5bc42edbe6a9ee4221fbf1ebbacd44238576e77f7b2d5f5d3ac90d433b8b6f5493fef51747405e14a5aa2cf59a4663b2cf385b4610

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks