General

  • Target

    3a68b4516c1c6a6b78a5b175abc6c18557a05ae9dcf7c056543ba9603aa0c3c6

  • Size

    128KB

  • Sample

    241120-vl3q7azara

  • MD5

    94dbb662380b5f0e0cd09dd3e5add654

  • SHA1

    eb7f6dd2dbf8b5e57e2acfb6eb63c6df308b22e9

  • SHA256

    3a68b4516c1c6a6b78a5b175abc6c18557a05ae9dcf7c056543ba9603aa0c3c6

  • SHA512

    5da77c3d363ee19c32fd7d2b4efb944ee7bfd115edf9fb23b1a2a36a7d463808c4508749390152bc39ad10e78bfcfc807c7d373bd7ddab17043623c6cb29ee96

  • SSDEEP

    3072:/CBeY5kb0TUNAuBqVPlB11nBE+NLdefk0l4uyRhUM:/CEYOb0TUquBqt7nBXLkD6uyRhUM

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://vidadohomem.com/wp-content/ehiZ/

exe.dropper

https://ats-tx.com/old/hNKe8J/

exe.dropper

https://webdachieu.com/wp-admin/7mRmsM/

exe.dropper

https://www.cupgel.com/__MACOSX/Ao7k7I/

exe.dropper

https://anhung1102.vn/wp-admin/RU/

exe.dropper

http://www.weblinx.com.pk/algarments.com.pk/vEB6W/

exe.dropper

http://maksi.feb.unib.ac.id/wp-admin/mTWAIv/

Targets

    • Target

      3a68b4516c1c6a6b78a5b175abc6c18557a05ae9dcf7c056543ba9603aa0c3c6

    • Size

      128KB

    • MD5

      94dbb662380b5f0e0cd09dd3e5add654

    • SHA1

      eb7f6dd2dbf8b5e57e2acfb6eb63c6df308b22e9

    • SHA256

      3a68b4516c1c6a6b78a5b175abc6c18557a05ae9dcf7c056543ba9603aa0c3c6

    • SHA512

      5da77c3d363ee19c32fd7d2b4efb944ee7bfd115edf9fb23b1a2a36a7d463808c4508749390152bc39ad10e78bfcfc807c7d373bd7ddab17043623c6cb29ee96

    • SSDEEP

      3072:/CBeY5kb0TUNAuBqVPlB11nBE+NLdefk0l4uyRhUM:/CEYOb0TUquBqt7nBXLkD6uyRhUM

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks