General

  • Target

    fd9fe0ade0e4a0288bc1274ad9ebd5b080c82e6b221e243cd2810d94368e097b.doc

  • Size

    126KB

  • Sample

    241028-ecvq8axmcp

  • MD5

    b9dde198d2ca4cb42b39ed65c78a7432

  • SHA1

    3b9266bf5d632b03d4d68de30dc3c42454b9422d

  • SHA256

    fd9fe0ade0e4a0288bc1274ad9ebd5b080c82e6b221e243cd2810d94368e097b

  • SHA512

    c6b17cf410e949a75115c613d82bc0e999e0d26e892545ab30287e84ddc20bd1091754f4e1c0fa4fe12684398f7472cd16fca376e25c37520981f4b27a202bf2

  • SSDEEP

    768:bRKuqG2R5aSdM4hsSjtvSHg8NRQKb0oAY/oqkuFg9:b02B4nqMvf6RQKxAqH9F4

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Targets

    • Target

      fd9fe0ade0e4a0288bc1274ad9ebd5b080c82e6b221e243cd2810d94368e097b.doc

    • Size

      126KB

    • MD5

      b9dde198d2ca4cb42b39ed65c78a7432

    • SHA1

      3b9266bf5d632b03d4d68de30dc3c42454b9422d

    • SHA256

      fd9fe0ade0e4a0288bc1274ad9ebd5b080c82e6b221e243cd2810d94368e097b

    • SHA512

      c6b17cf410e949a75115c613d82bc0e999e0d26e892545ab30287e84ddc20bd1091754f4e1c0fa4fe12684398f7472cd16fca376e25c37520981f4b27a202bf2

    • SSDEEP

      768:bRKuqG2R5aSdM4hsSjtvSHg8NRQKb0oAY/oqkuFg9:b02B4nqMvf6RQKxAqH9F4

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Evasion via Device Credential Deployment

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks