General

  • Target

    523c250d1911c432d329a21cfb987165e7cb3c70d5e83910cca688334a6228ae

  • Size

    243KB

  • Sample

    241120-k816rsvlaw

  • MD5

    223b958e302f09502a5a32029a865886

  • SHA1

    0399b1175936f7a11a709f60d3efec16af959274

  • SHA256

    523c250d1911c432d329a21cfb987165e7cb3c70d5e83910cca688334a6228ae

  • SHA512

    43d06e4fd60753dac3de5ac09b0d02803a6f492e97d906057cf8ac37baa91e6acfd40be838bce9f2ea7bb16195bdc34921eb02e2e642f1a2db29dfa0f9eafce6

  • SSDEEP

    6144:a0Rum7mdLRp1bbSBIR/EHGtCMXgTo8qoFt/etg+UZUQGMC:a0E3dxtR/iU9mvUPbQGMC

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.hgklighting.com/wp-admin/g0bm/

exe.dropper

http://thegioilap.vn/wp-content/EV/

exe.dropper

http://pilkom.ulm.ac.id/wp-content/r4iio/

exe.dropper

http://165.227.220.53/wp-includes/YEQ4r/

exe.dropper

https://jelajahpulautidung.com/t4ierwnn/8j/

Targets

    • Target

      523c250d1911c432d329a21cfb987165e7cb3c70d5e83910cca688334a6228ae

    • Size

      243KB

    • MD5

      223b958e302f09502a5a32029a865886

    • SHA1

      0399b1175936f7a11a709f60d3efec16af959274

    • SHA256

      523c250d1911c432d329a21cfb987165e7cb3c70d5e83910cca688334a6228ae

    • SHA512

      43d06e4fd60753dac3de5ac09b0d02803a6f492e97d906057cf8ac37baa91e6acfd40be838bce9f2ea7bb16195bdc34921eb02e2e642f1a2db29dfa0f9eafce6

    • SSDEEP

      6144:a0Rum7mdLRp1bbSBIR/EHGtCMXgTo8qoFt/etg+UZUQGMC:a0E3dxtR/iU9mvUPbQGMC

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks