General

  • Target

    Document.xla

  • Size

    1.0MB

  • Sample

    241028-mdjpcawhjh

  • MD5

    1c220dca89b554c1365291ead95bfa31

  • SHA1

    98234f8ae71502f109890e1f67a850fda1a2673a

  • SHA256

    c9b46bf282df72278be6af59bb7acb43f5b6405d2567008d6fd56ed440e42377

  • SHA512

    a4979842684119c4c703744bc074ff8abff61bb1ffb514d331f6c319fefe6c9c0ddff0ede403ec88f3756c5dbf2588c1b73e2c4f29280f68ab2cf8fd16e0cc18

  • SSDEEP

    24576:lhfgpB31HbARM8UbCE4ypOkgNAvRioX4:lxMV18Ibrj9B

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Targets

    • Target

      Document.xla

    • Size

      1.0MB

    • MD5

      1c220dca89b554c1365291ead95bfa31

    • SHA1

      98234f8ae71502f109890e1f67a850fda1a2673a

    • SHA256

      c9b46bf282df72278be6af59bb7acb43f5b6405d2567008d6fd56ed440e42377

    • SHA512

      a4979842684119c4c703744bc074ff8abff61bb1ffb514d331f6c319fefe6c9c0ddff0ede403ec88f3756c5dbf2588c1b73e2c4f29280f68ab2cf8fd16e0cc18

    • SSDEEP

      24576:lhfgpB31HbARM8UbCE4ypOkgNAvRioX4:lxMV18Ibrj9B

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Evasion via Device Credential Deployment

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks