General

  • Target

    572fb97b1fec24c598ccb6113fa40a3c81c1c6d0e1d01f1611920c131cbeca7c

  • Size

    167KB

  • Sample

    241120-l7d6aawcjl

  • MD5

    0898b0beac0d89db7a616cd49676b951

  • SHA1

    ba58393c0d3dc1f9cbdfa66351254c30b126503d

  • SHA256

    572fb97b1fec24c598ccb6113fa40a3c81c1c6d0e1d01f1611920c131cbeca7c

  • SHA512

    6dc84807ed898aa96b9cc04d4f2bd1cbf6f211345dc3fc627111578bdee24a9a7f38eb2b5f9acab12637183546bdae1da1f3df2f6847b6949d3fe0cffc8b92bc

  • SSDEEP

    3072:3/AwBB2sniZEg43bOp9AtdLaMigcOWwVW8KQlanxvlqYp+9bzbDgEarpHfR+yUJ1:zJiP/w2PZevVnL+JA8lX1h9a

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://rossie.in/wp/6L0U/

exe.dropper

https://envirohubconsulting.co.za/cgi-bin/vI5/

exe.dropper

https://grandages.org.my/office/y6Uz/

exe.dropper

http://dailypharmajobs.com/cgi-bin/CyCdO/

exe.dropper

https://comercialadvance.com/images/MFXxM5Tg/

exe.dropper

https://royalnight.in/wp/lEA2gXXBj/

exe.dropper

https://gymmuscle.tk/wp-content/U8j1Bkh/

Targets

    • Target

      572fb97b1fec24c598ccb6113fa40a3c81c1c6d0e1d01f1611920c131cbeca7c

    • Size

      167KB

    • MD5

      0898b0beac0d89db7a616cd49676b951

    • SHA1

      ba58393c0d3dc1f9cbdfa66351254c30b126503d

    • SHA256

      572fb97b1fec24c598ccb6113fa40a3c81c1c6d0e1d01f1611920c131cbeca7c

    • SHA512

      6dc84807ed898aa96b9cc04d4f2bd1cbf6f211345dc3fc627111578bdee24a9a7f38eb2b5f9acab12637183546bdae1da1f3df2f6847b6949d3fe0cffc8b92bc

    • SSDEEP

      3072:3/AwBB2sniZEg43bOp9AtdLaMigcOWwVW8KQlanxvlqYp+9bzbDgEarpHfR+yUJ1:zJiP/w2PZevVnL+JA8lX1h9a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks