General

  • Target

    3e17931226fd20117b19ff7e363d130f8fb2392d54f24ece82295a813b93f452

  • Size

    111KB

  • Sample

    241119-xdwc9azlew

  • MD5

    5857378a01068715692ac905d598144a

  • SHA1

    b62cd9fddf83f4dd2cd12d1ea0a62cccced752c7

  • SHA256

    3e17931226fd20117b19ff7e363d130f8fb2392d54f24ece82295a813b93f452

  • SHA512

    3809eae7d7934cf31f10973275c14b9b6edb9db1daba736ba2e498ff33738a4bd0e72f9e00cf3e95d92936a7f2d47387e663cc42cc9e5cb1873cf64aa89c966a

  • SSDEEP

    1536:PdsEI79RRXHI4o3C8VseP12QaGZKR3K87ftgfxSS66oXzOVZdIWLDyQizf:FJI7/m4LcRtaXR3KUtE4sYzOXPVq

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://reumatismclinic.com/-/scCnm3mbJRpsaBKBbrC/

exe.dropper

https://shodhmanjari.com/wp-admin/xjEmK4Pd3N/

exe.dropper

http://tubelocal.net/wp-admin/X4Xm4Mk/

exe.dropper

https://pacifichomebroker.com/roderick/RRk/

exe.dropper

https://molinai-journal.com/wp-content/4HBv/

exe.dropper

https://marineboyrecords.com/font-awesome/QBBByHDDYl0slxlQ/

exe.dropper

https://mashuk.net/wp-includes/ej6R4fkU/

exe.dropper

https://lapalette.store/Fox-C404/Gngia6hD0i5zsgd2/

exe.dropper

https://jhonnycryptic.com/cgi-bin/OhZdKCDRBYGZudqs/

exe.dropper

https://korean911.com/wp-admin/TZczIsZtMFXxM5T/

exe.dropper

https://fonijuk.org/wp-content/fzq6vYFUMEiRoR8vG/

exe.dropper

https://baltoe.blog/-/6IC/

Targets

    • Target

      3e17931226fd20117b19ff7e363d130f8fb2392d54f24ece82295a813b93f452

    • Size

      111KB

    • MD5

      5857378a01068715692ac905d598144a

    • SHA1

      b62cd9fddf83f4dd2cd12d1ea0a62cccced752c7

    • SHA256

      3e17931226fd20117b19ff7e363d130f8fb2392d54f24ece82295a813b93f452

    • SHA512

      3809eae7d7934cf31f10973275c14b9b6edb9db1daba736ba2e498ff33738a4bd0e72f9e00cf3e95d92936a7f2d47387e663cc42cc9e5cb1873cf64aa89c966a

    • SSDEEP

      1536:PdsEI79RRXHI4o3C8VseP12QaGZKR3K87ftgfxSS66oXzOVZdIWLDyQizf:FJI7/m4LcRtaXR3KUtE4sYzOXPVq

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Enterprise v15

Tasks