General

  • Target

    e7b60a638ac578b594cff9aade9c17415854f1d527a1974db092d0772e676819

  • Size

    213KB

  • Sample

    241120-1p9xkaynap

  • MD5

    ae750ae1d56d6c70f5b93344d70218b6

  • SHA1

    49736f692f34f59e3640be867924542c67797247

  • SHA256

    e7b60a638ac578b594cff9aade9c17415854f1d527a1974db092d0772e676819

  • SHA512

    13c756b5ffcc987b645ffdd0febc6a63a60a2021889b562268cc134ea4cfb9fc460af9365de3a857246e749bea68e14fb2c28137337a986dfb2db639edb9fb50

  • SSDEEP

    6144:7n2k4ctGiL3HJk9TD7bb5HDWWv9EvIFbL:7n9Qitk57bNVbL

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://diwafashions.com/wp-admin/mqau6/

exe.dropper

http://designers.hotcom-web.com/ubkskw29clek/qnpm1p/

exe.dropper

http://dixartcontractors.com/cgi-bin/nnuv/

exe.dropper

http://diaspotv.info/wordpress/G/

exe.dropper

http://easyvisaoverseas.com/cgi-bin/v/

Targets

    • Target

      e7b60a638ac578b594cff9aade9c17415854f1d527a1974db092d0772e676819

    • Size

      213KB

    • MD5

      ae750ae1d56d6c70f5b93344d70218b6

    • SHA1

      49736f692f34f59e3640be867924542c67797247

    • SHA256

      e7b60a638ac578b594cff9aade9c17415854f1d527a1974db092d0772e676819

    • SHA512

      13c756b5ffcc987b645ffdd0febc6a63a60a2021889b562268cc134ea4cfb9fc460af9365de3a857246e749bea68e14fb2c28137337a986dfb2db639edb9fb50

    • SSDEEP

      6144:7n2k4ctGiL3HJk9TD7bb5HDWWv9EvIFbL:7n9Qitk57bNVbL

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks