General

  • Target

    ae247c339bb518965c9459e53f56ad2d49d8aa3d4741c3866267568ab44ff136

  • Size

    147KB

  • Sample

    241120-14wcqatgnh

  • MD5

    a8d59752b195f12e0b0c8a82cd192db3

  • SHA1

    a14c855c8f4545ca273f42e52ae2c599104178c6

  • SHA256

    ae247c339bb518965c9459e53f56ad2d49d8aa3d4741c3866267568ab44ff136

  • SHA512

    3c3291e0f683728f9726b1be94e320fcb6c6130e5cc41a0bbf99fdacf9fc7950fa32c1f68ccb567f1ba73da6f80b454aafa96535a88a7401cee01fbcc7a0dd8c

  • SSDEEP

    3072:H5BeY5kb0TUNAuBqVPlB11nBkwzdsIpzJ9gouDkRm9G:H5EYOb0TUquBqt7nBDZsIpzJtlRm9G

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://newmoontec.com/wp-content/uploads/8R0lFV/

exe.dropper

http://kiasoo.com/dl/7y7I1V/

exe.dropper

http://malkaragida.com/content/Una/

exe.dropper

http://xiaolechen.com/pollinodial/5lTy0/

exe.dropper

http://mallowsvirtualcreatives.com/wp-content/2pw1/

exe.dropper

https://rfcrfc.com/wp-admin/oZ/

exe.dropper

http://bbs.rfcrfc.com/api/V/

Targets

    • Target

      ae247c339bb518965c9459e53f56ad2d49d8aa3d4741c3866267568ab44ff136

    • Size

      147KB

    • MD5

      a8d59752b195f12e0b0c8a82cd192db3

    • SHA1

      a14c855c8f4545ca273f42e52ae2c599104178c6

    • SHA256

      ae247c339bb518965c9459e53f56ad2d49d8aa3d4741c3866267568ab44ff136

    • SHA512

      3c3291e0f683728f9726b1be94e320fcb6c6130e5cc41a0bbf99fdacf9fc7950fa32c1f68ccb567f1ba73da6f80b454aafa96535a88a7401cee01fbcc7a0dd8c

    • SSDEEP

      3072:H5BeY5kb0TUNAuBqVPlB11nBkwzdsIpzJ9gouDkRm9G:H5EYOb0TUquBqt7nBDZsIpzJtlRm9G

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks