General

  • Target

    Swift Copy.xls

  • Size

    98KB

  • Sample

    241029-ksqp4ateqe

  • MD5

    524559bfe8623365f3e1569b5b58be85

  • SHA1

    2638ebe72c1df88dd7d9ba66654c55160d41287c

  • SHA256

    752387dc376a39db5dcdf2b0030bef0e516b1331b059fff96e4f87f48126a1c8

  • SHA512

    c2b7f278e9827a53f325c94f736b04451f1021807be5b54c68534e6f2f1f24a51a7977bc762f8dd216d83821be8c85309d2b953117412181848cac877afcc454

  • SSDEEP

    1536:BiqHy1S6F8b2SQrEkawpoXIoGks1Y5jWWTerlEdA5xwiglkk/UlvKBut:beFHrE2sIoGdYkF6y5xtIkk/Oi

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

exe.dropper

https://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvUhBYwur

Targets

    • Target

      Swift Copy.xls

    • Size

      98KB

    • MD5

      524559bfe8623365f3e1569b5b58be85

    • SHA1

      2638ebe72c1df88dd7d9ba66654c55160d41287c

    • SHA256

      752387dc376a39db5dcdf2b0030bef0e516b1331b059fff96e4f87f48126a1c8

    • SHA512

      c2b7f278e9827a53f325c94f736b04451f1021807be5b54c68534e6f2f1f24a51a7977bc762f8dd216d83821be8c85309d2b953117412181848cac877afcc454

    • SSDEEP

      1536:BiqHy1S6F8b2SQrEkawpoXIoGks1Y5jWWTerlEdA5xwiglkk/UlvKBut:beFHrE2sIoGdYkF6y5xtIkk/Oi

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Evasion via Device Credential Deployment

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks