General

  • Target

    756a9f9016b69053d2fda277be628f93f629d0a45299bc88bd8a95b2722464af

  • Size

    719KB

  • Sample

    241022-bdn4aazapn

  • MD5

    c76d319f7177a7c65c84b13ef366a747

  • SHA1

    23548c316070c88a68b3cd68ae4c708eba91e110

  • SHA256

    756a9f9016b69053d2fda277be628f93f629d0a45299bc88bd8a95b2722464af

  • SHA512

    33f26f9a0eafedee6c1958425072f8c8f9d9f2dcfd31a5e7b1bc34d9c997632ce15a572c0d6c34e105a602a233ad7dca2eb24dbe68ad788077f402eafa29a9c1

  • SSDEEP

    12288:nb7e6DDgasCeaepqrZojpvKievCqWM2KZLwgn7QbBt4slfofgHz8nOZzcEkQ:by0ETFaQqripJzqWM2KZkGKXlfo8zRZt

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1-Wdgeq0fX9aApdlSW9dln1Pc_KEGpfHp

exe.dropper

https://drive.google.com/uc?export=download&id=1-Wdgeq0fX9aApdlSW9dln1Pc_KEGpfHp

Targets

    • Target

      756a9f9016b69053d2fda277be628f93f629d0a45299bc88bd8a95b2722464af

    • Size

      719KB

    • MD5

      c76d319f7177a7c65c84b13ef366a747

    • SHA1

      23548c316070c88a68b3cd68ae4c708eba91e110

    • SHA256

      756a9f9016b69053d2fda277be628f93f629d0a45299bc88bd8a95b2722464af

    • SHA512

      33f26f9a0eafedee6c1958425072f8c8f9d9f2dcfd31a5e7b1bc34d9c997632ce15a572c0d6c34e105a602a233ad7dca2eb24dbe68ad788077f402eafa29a9c1

    • SSDEEP

      12288:nb7e6DDgasCeaepqrZojpvKievCqWM2KZLwgn7QbBt4slfofgHz8nOZzcEkQ:by0ETFaQqripJzqWM2KZkGKXlfo8zRZt

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks