General

  • Target

    e134be8e8d06750e35aa40bd07f803f10b81771922b3359bad340c42ea515d69

  • Size

    115KB

  • Sample

    241120-j1nd9stpay

  • MD5

    534f748768d017ec412010dcd80c5f77

  • SHA1

    1dba2090898f93011ea24d4f9ec8c128be1c41de

  • SHA256

    e134be8e8d06750e35aa40bd07f803f10b81771922b3359bad340c42ea515d69

  • SHA512

    3c51d968e34f715e062d115aabbdf50a74af50cf6837ad90be613ab94bd496e0b092659be99c9fb74f3c9ca5968bb1f56159301143a0ae3d1f1468c2b8051537

  • SSDEEP

    3072:FG1t/xnW4LcRtaXR3KUtE4sYzOXPN1Cqj:Fi/RdL8e3KU5skOX/X

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://sumedhaonline.com/wp-content/HyzNXJ30XOQVcBSRH/

exe.dropper

http://divachintextiles.com/wp-includes/WWhWRKs8KvzNFm6/

exe.dropper

http://hotelandamalabo.com/1520/bUdhEPdf/

exe.dropper

http://shwenantawwin.com/copma/XTnZIi02vfVblK7/

exe.dropper

http://tan4j.com/wp-content/languages/yOI5h8uoRe/

exe.dropper

https://khibra-academy.com/wp-content/c1dR8wP4OdhzApHn/

exe.dropper

https://dwwmaster.com/wp-content/W7XGpodRs5kYvnV/

exe.dropper

http://edinsonjhernandez.net/wp-content/vndSGB/

exe.dropper

https://stayathomeamerica.com/wp-content/nrQWW/

exe.dropper

http://quetzalgt.coffee/images/B5WUc/

exe.dropper

http://edinsonjhernandez.info/wp-content/BaazJljahSR2/

exe.dropper

http://xn--90agbba9adnzt3i.com/ALFA_DATA/ucCbi6G/

Targets

    • Target

      e134be8e8d06750e35aa40bd07f803f10b81771922b3359bad340c42ea515d69

    • Size

      115KB

    • MD5

      534f748768d017ec412010dcd80c5f77

    • SHA1

      1dba2090898f93011ea24d4f9ec8c128be1c41de

    • SHA256

      e134be8e8d06750e35aa40bd07f803f10b81771922b3359bad340c42ea515d69

    • SHA512

      3c51d968e34f715e062d115aabbdf50a74af50cf6837ad90be613ab94bd496e0b092659be99c9fb74f3c9ca5968bb1f56159301143a0ae3d1f1468c2b8051537

    • SSDEEP

      3072:FG1t/xnW4LcRtaXR3KUtE4sYzOXPN1Cqj:Fi/RdL8e3KU5skOX/X

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks