General

  • Target

    6d8c18225d54e57ba8a925aca68fbed403131cd3e2252c89702285cc2a2a1b7d

  • Size

    171KB

  • Sample

    241120-pllvsaxcpr

  • MD5

    a2891a0b5e1936d975b0bec7d04f44a9

  • SHA1

    b57bc9e3f1f29223d9a52a01707c4ce2e1eea852

  • SHA256

    6d8c18225d54e57ba8a925aca68fbed403131cd3e2252c89702285cc2a2a1b7d

  • SHA512

    8b4e352e9017e5d352b2d6282edfb431f758e61f2b732c2e175f97b11462ae4dda74957c3ca1865847133785db1f32dfc184af14edd244e53db24c18860ffecc

  • SSDEEP

    3072:+4PrXcuQuvpzm4bkiaMQgAlSCPoAnMC4EGilWOTw00rRX:3DRv1m4bnQgISCPo69w00rRX

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://chestersvideobar.com/blogs/w0x0lEZ/

exe.dropper

http://paula.strategicwebmarketingmd.com/wp-admin/rdi3505/

exe.dropper

https://bucksngems.com/bucksn0/r96270/

exe.dropper

http://xiaodaji.com/wp-includes/ID3/DeQFPrxR/

exe.dropper

http://www.coworkanytime.com/wp-content/uploads/DZIizOT/

Targets

    • Target

      6d8c18225d54e57ba8a925aca68fbed403131cd3e2252c89702285cc2a2a1b7d

    • Size

      171KB

    • MD5

      a2891a0b5e1936d975b0bec7d04f44a9

    • SHA1

      b57bc9e3f1f29223d9a52a01707c4ce2e1eea852

    • SHA256

      6d8c18225d54e57ba8a925aca68fbed403131cd3e2252c89702285cc2a2a1b7d

    • SHA512

      8b4e352e9017e5d352b2d6282edfb431f758e61f2b732c2e175f97b11462ae4dda74957c3ca1865847133785db1f32dfc184af14edd244e53db24c18860ffecc

    • SSDEEP

      3072:+4PrXcuQuvpzm4bkiaMQgAlSCPoAnMC4EGilWOTw00rRX:3DRv1m4bnQgISCPo69w00rRX

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks