General

  • Target

    7bfb668ee72561b447d26555fba8588145b02d14fa33e1ca5448aa4281ca5eeb

  • Size

    178KB

  • Sample

    241119-mz16hsvkdz

  • MD5

    cd75cf5ea1bcb6dfa75deacab911dabf

  • SHA1

    2300304895d4439e18e2b43c590d14a6be840f4c

  • SHA256

    7bfb668ee72561b447d26555fba8588145b02d14fa33e1ca5448aa4281ca5eeb

  • SHA512

    82cdb17710620946dce8462fd5069996c0d7be92200bd835820ecc75d13cf25168952a2423ddf5b0ccfa1b3263cda2a002691a6cdec6eea8b70bbaf17bd6791a

  • SSDEEP

    3072:972y/GdynktGDWLS0HZWD5w8K7Nk96D7IBUbZB0zstySfNllXeR:972k43tGiL3HJk96D7bv0z0rllXY

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.yadegarebastan.com/wp-content/mhear/

exe.dropper

http://bikerzonebd.com/wp-admin/89gw/

exe.dropper

http://shptoys.com/_old/bvGej/

exe.dropper

http://www.vestalicom.com/facturation/qgm0t/

exe.dropper

http://www.aliounendiaye.com/wp-content/f3hs6j/

Targets

    • Target

      7bfb668ee72561b447d26555fba8588145b02d14fa33e1ca5448aa4281ca5eeb

    • Size

      178KB

    • MD5

      cd75cf5ea1bcb6dfa75deacab911dabf

    • SHA1

      2300304895d4439e18e2b43c590d14a6be840f4c

    • SHA256

      7bfb668ee72561b447d26555fba8588145b02d14fa33e1ca5448aa4281ca5eeb

    • SHA512

      82cdb17710620946dce8462fd5069996c0d7be92200bd835820ecc75d13cf25168952a2423ddf5b0ccfa1b3263cda2a002691a6cdec6eea8b70bbaf17bd6791a

    • SSDEEP

      3072:972y/GdynktGDWLS0HZWD5w8K7Nk96D7IBUbZB0zstySfNllXeR:972k43tGiL3HJk96D7bv0z0rllXY

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks