General

  • Target

    7121511be098eeda9347b7abefe3a43cfe2db66cc90f9ec5dc9281f3bf16a7a2

  • Size

    122KB

  • Sample

    241120-vrsheazmgs

  • MD5

    932af14bb09552210ed92129c2ef6168

  • SHA1

    71fd6c19504d5e9f40fbca9d6eb40dd999f6e920

  • SHA256

    7121511be098eeda9347b7abefe3a43cfe2db66cc90f9ec5dc9281f3bf16a7a2

  • SHA512

    edf4be21e0e9cc09e74fd631f50009b432bb1a578f3cf478446d8b7c913ad39f7cff61d4f2008cf060c4856d4198200d36cf11aff732c4e956ffda9e939ac2b4

  • SSDEEP

    3072:mOehv7q2Pjx45uoDGTj+5xtekEvi8/dgZBFoTLTmxW5WxVe+41WsdiXUchlL:behv7q2Pjx45uoDGTj+5xtFEvi8/dgZ3

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://midnightsilvercrafters.com/store/wBjNOUw/

exe.dropper

http://tempral.com/NATE_05_22_2009/BI710N4cQ6R3/

exe.dropper

https://redington.karmatechmediaworks.com/wp-content/3JVuVx7QUM/

exe.dropper

https://uhc.karmatechmediaworks.com/wp-content/0EqfdeznntlOpaIP2Qv/

exe.dropper

https://servilogic.net/b/14hqrdyP0Z3WsbQib8/

exe.dropper

https://comezmuhendislik.com/ljfrmm/VTpHRFWoORAHnRQ3aQL/

exe.dropper

http://webmail.glemedical.com/wp-content/J1M2xxodH/

exe.dropper

http://toto.karmatechmediaworks.com/wp-content/i826vbcVgRJ/

exe.dropper

https://golfpia.karmatechmediaworks.com/wp-content/oEicpDnEkk/

exe.dropper

https://fortiuspharma.com/y6krss/EGm347cqj5/

exe.dropper

https://garyjharris.com/cgi-bin/0hH/

exe.dropper

https://vietnam.karmatechmediaworks.com/wp-content/PfSVQagusZy7AaMw/

exe.dropper

https://vinculinc.karmatechmediaworks.com/wp-content/VlcOPPwgidWlXDJNs6/

Targets

    • Target

      7121511be098eeda9347b7abefe3a43cfe2db66cc90f9ec5dc9281f3bf16a7a2

    • Size

      122KB

    • MD5

      932af14bb09552210ed92129c2ef6168

    • SHA1

      71fd6c19504d5e9f40fbca9d6eb40dd999f6e920

    • SHA256

      7121511be098eeda9347b7abefe3a43cfe2db66cc90f9ec5dc9281f3bf16a7a2

    • SHA512

      edf4be21e0e9cc09e74fd631f50009b432bb1a578f3cf478446d8b7c913ad39f7cff61d4f2008cf060c4856d4198200d36cf11aff732c4e956ffda9e939ac2b4

    • SSDEEP

      3072:mOehv7q2Pjx45uoDGTj+5xtekEvi8/dgZBFoTLTmxW5WxVe+41WsdiXUchlL:behv7q2Pjx45uoDGTj+5xtFEvi8/dgZ3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks