General

  • Target

    73938b7c33abea137db59379cfb5480c697197ff03aebeee8921cd82dadf23bd

  • Size

    141KB

  • Sample

    241120-2jtttszjcr

  • MD5

    a16fbff1f5cb9686bb89b10e438fa353

  • SHA1

    ed66c497457afb8309866e2cacf62857d9e844c9

  • SHA256

    73938b7c33abea137db59379cfb5480c697197ff03aebeee8921cd82dadf23bd

  • SHA512

    35fce4faf788b1b5e074ee55a4ef2b2956d6a5b22f5fc5d1daa34bfdd5c36ccd85ac5808088d0e8a1cac147f6a4033ed8fd5e55e0930c76cbb2bdc6d74c32642

  • SSDEEP

    3072:P7cKoSsxzNDZLDZjlbR868O8K0c03D38TehYTdeHVhjqabWHLtyeGx6Z84TI0Gxc:zcKoSsxzNDZLDZjlbR868O8K0c03D38X

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://chupahfashion.com/eh6bwxk/bowptl/cLo9eq8v8Vht/

exe.dropper

http://ancyh.xyz/Fox-C/LxAhgyO3fMg/

exe.dropper

http://gravton-dev-cms.policyfest.com/Fox-C/BMOkGelwu/

exe.dropper

https://capitalui.futuristic.agency/wp-admin/hwi9bnmXFFm3doo/

exe.dropper

http://cptdmy.com/zqtr/zdJE0jEOxL/

exe.dropper

https://weviralyou.com/wp-content/yl5qV15jWWfaGdSZLR/

exe.dropper

https://megabyte-xtnegocios.com/ys3v1clw/AKm6Q9/

exe.dropper

https://vmsparamedical.com/urjk0xr/PhfwL/

exe.dropper

https://viprait.com/lag5gn/cdy6k/

exe.dropper

https://comingsoon.futuristic.agency/svg/p4xODmupFbHPnr/

Targets

    • Target

      73938b7c33abea137db59379cfb5480c697197ff03aebeee8921cd82dadf23bd

    • Size

      141KB

    • MD5

      a16fbff1f5cb9686bb89b10e438fa353

    • SHA1

      ed66c497457afb8309866e2cacf62857d9e844c9

    • SHA256

      73938b7c33abea137db59379cfb5480c697197ff03aebeee8921cd82dadf23bd

    • SHA512

      35fce4faf788b1b5e074ee55a4ef2b2956d6a5b22f5fc5d1daa34bfdd5c36ccd85ac5808088d0e8a1cac147f6a4033ed8fd5e55e0930c76cbb2bdc6d74c32642

    • SSDEEP

      3072:P7cKoSsxzNDZLDZjlbR868O8K0c03D38TehYTdeHVhjqabWHLtyeGx6Z84TI0Gxc:zcKoSsxzNDZLDZjlbR868O8K0c03D38X

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks