General

  • Target

    e7b0128fdc780e228be72adbed8765c4.bin

  • Size

    758KB

  • Sample

    241027-b61b1ssape

  • MD5

    9cdf8ea25331dbacf563d59f3fb2a614

  • SHA1

    631153a60440613f0e893be57611b39e1af77602

  • SHA256

    0b054ce9d37f0897d0a40b6485d6629baea938dcf9179e290b1808357df5297a

  • SHA512

    09675946dcaa7d9fca23077ac04a63ddf6fc399780d80a9e3cf4deab080c4c4b177dfc721bc4c75baf8c53bbd38001e893df327bd1a9ae4fac245c32bea9df46

  • SSDEEP

    12288:gbkuhdT3H+DkbYplYLGtwJHTDUeG3z6oM3DVLZig/OCGisJTD/wf8r1Cd6fmtAg0:qXbYpttw0ezogJVdcv3E0mWr8SRKIFT

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Targets

    • Target

      c03299410145508191967d0544203e1aed4fc9886b7b11d6d4f05500d002a786.xls

    • Size

      1.0MB

    • MD5

      e7b0128fdc780e228be72adbed8765c4

    • SHA1

      4a7456b2d6422c33f8f7aafa302cd43c8d2d5033

    • SHA256

      c03299410145508191967d0544203e1aed4fc9886b7b11d6d4f05500d002a786

    • SHA512

      da2da848812a40e02e547f6c047baa345492839ac322965721c1988ba862ae3535edb1f9928359db9d64df4eacfd0bcf4e412eaa762cb88e712f2d8b5a56f5b8

    • SSDEEP

      12288:nmzHJEyfN1Y1uBPj39wZE8D3DERnLRmF8D6IHf8wh9HN8zFykCGrqD:uhfg14318bARM8FH/hX85yhz

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Evasion via Device Credential Deployment

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks