General

  • Target

    af70aef3c82e00c84250dd33d47109448867293a541d7dab35656264353d447a.exe

  • Size

    15KB

  • Sample

    241119-xrq1pazglb

  • MD5

    fccd81097ec5a4c880aafd0fc504afe3

  • SHA1

    9443fc2d9a7a4a0bcdd9920fa3be1279e21b0011

  • SHA256

    af70aef3c82e00c84250dd33d47109448867293a541d7dab35656264353d447a

  • SHA512

    9c0d80699824746c738b1dc1e9d7f0dab2c0386d652c6f5054301cfa24ca3da82ac3046b5890599c34679df25252c233d41e4da559f8cdfb8b823d47f42030d0

  • SSDEEP

    384:6PQ3CoT+Vl1gunfFASOh8sIGUbmeuAcRdThoo:6P886Mt0h8sIt8z1

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://cdn.jsdelivr.net/gh/i87924hgasdhg/hgytiryty/bboxfull

Targets

    • Target

      af70aef3c82e00c84250dd33d47109448867293a541d7dab35656264353d447a.exe

    • Size

      15KB

    • MD5

      fccd81097ec5a4c880aafd0fc504afe3

    • SHA1

      9443fc2d9a7a4a0bcdd9920fa3be1279e21b0011

    • SHA256

      af70aef3c82e00c84250dd33d47109448867293a541d7dab35656264353d447a

    • SHA512

      9c0d80699824746c738b1dc1e9d7f0dab2c0386d652c6f5054301cfa24ca3da82ac3046b5890599c34679df25252c233d41e4da559f8cdfb8b823d47f42030d0

    • SSDEEP

      384:6PQ3CoT+Vl1gunfFASOh8sIGUbmeuAcRdThoo:6P886Mt0h8sIt8z1

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks