General

  • Target

    Shipping Documents WMLREF115900.xls

  • Size

    98KB

  • Sample

    241024-hd4masxdna

  • MD5

    98502d8342f1afd8b699b26ff777a919

  • SHA1

    0d0c6a6f90611fee9c232d90fca0776dbbff5241

  • SHA256

    40bcfababa169393524d58a9447ea465ac7a18edd09ae9eaea2739c8d77dab9d

  • SHA512

    0d1e03166c7dc08098acaeace97930fdc7bfa5b50932bbb6ee151691202389f1d7d053c2d0b0a6248ecfa7a6056bd16a0ad2a61e91a6f03d292d7ace1d5e7e86

  • SSDEEP

    1536:MiqHy1S6F8b2SQrEkawpoXIow7yLHXXRD6G10u9QvuTUpx2MjeHmfDI7:UeFHrE2sIoeK3XR2GWumv6UprT

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Targets

    • Target

      Shipping Documents WMLREF115900.xls

    • Size

      98KB

    • MD5

      98502d8342f1afd8b699b26ff777a919

    • SHA1

      0d0c6a6f90611fee9c232d90fca0776dbbff5241

    • SHA256

      40bcfababa169393524d58a9447ea465ac7a18edd09ae9eaea2739c8d77dab9d

    • SHA512

      0d1e03166c7dc08098acaeace97930fdc7bfa5b50932bbb6ee151691202389f1d7d053c2d0b0a6248ecfa7a6056bd16a0ad2a61e91a6f03d292d7ace1d5e7e86

    • SSDEEP

      1536:MiqHy1S6F8b2SQrEkawpoXIow7yLHXXRD6G10u9QvuTUpx2MjeHmfDI7:UeFHrE2sIoeK3XR2GWumv6UprT

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Evasion via Device Credential Deployment

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks