General

  • Target

    e33209146f95e8c43d6ded642235f842d70b5c568d7ca006d52c4195423a8594

  • Size

    64KB

  • Sample

    241120-1gefpatngt

  • MD5

    d9a8f9f7a45dba6f6883e89189c71c9e

  • SHA1

    4da0ddb8fae437314db58089a38c50e5105e93b5

  • SHA256

    e33209146f95e8c43d6ded642235f842d70b5c568d7ca006d52c4195423a8594

  • SHA512

    83e21823dd9a1abffba2280ccfd6dcebdbb65ec27e80fe8d6d69c8dd9b7db1b73ac317bb29a30dc6542874aa84385b10148db9274903ed3ac7c0dfafe5b47663

  • SSDEEP

    768:KooRooooM6AoroooonooQoooVoooooIooNpJcaUitGAlmrJpmxlzC+w99NB33y/o:SptJlmrJpmxlRw99NBny/qJP8GjmuZ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.muabangiup.com/I6gpE

exe.dropper

http://www.tekere.es/ce45TO3

exe.dropper

http://www.expressarsetelagoas.com.br/8tr1wP

exe.dropper

http://www.fix4pc.co.uk/GOjXqkw

exe.dropper

http://www.flora-lux.by/mJHgzFh

Targets

    • Target

      e33209146f95e8c43d6ded642235f842d70b5c568d7ca006d52c4195423a8594

    • Size

      64KB

    • MD5

      d9a8f9f7a45dba6f6883e89189c71c9e

    • SHA1

      4da0ddb8fae437314db58089a38c50e5105e93b5

    • SHA256

      e33209146f95e8c43d6ded642235f842d70b5c568d7ca006d52c4195423a8594

    • SHA512

      83e21823dd9a1abffba2280ccfd6dcebdbb65ec27e80fe8d6d69c8dd9b7db1b73ac317bb29a30dc6542874aa84385b10148db9274903ed3ac7c0dfafe5b47663

    • SSDEEP

      768:KooRooooM6AoroooonooQoooVoooooIooNpJcaUitGAlmrJpmxlzC+w99NB33y/o:SptJlmrJpmxlRw99NBny/qJP8GjmuZ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Enterprise v15

Tasks