General

  • Target

    6065af651170b0e2847ad1bdf896449e0f8671a913080f10811813c0cfa72990

  • Size

    556KB

  • Sample

    241120-vwxb6azcje

  • MD5

    91793625f8689a3a75b7a3aa765b8d58

  • SHA1

    28cd7fa215ff1b035996570be68d71be6d0c8eee

  • SHA256

    6065af651170b0e2847ad1bdf896449e0f8671a913080f10811813c0cfa72990

  • SHA512

    e664e01586c76839ad35eb533e857fdaed961ca34e799513f78265e34840a86f0417651b9e814a989ae42c284e2982d5c633c19a7d2b32933643fe0e726d1a98

  • SSDEEP

    12288:Yr56GBKDsjzor56GBKD4K1r56GBKD7Or56GBKD12r56GBKDsUA:Yr518ojUr518Ecr518Gr518Z2r518oUA

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://marmolhi.com/_vti_bin/0nNKKlWZ4/

exe.dropper

https://comerciopuravida.com/wp-admin/qqUV32Q/

exe.dropper

http://www.closmaq.com.br/wp-admin/nc/

exe.dropper

http://pulseti.com/isla/61D/

exe.dropper

https://hotelunique.com/teste/oxda9J0BvF/

exe.dropper

http://greensync.com.br/aspnet_clientOld/Xyicd/

exe.dropper

http://muabannodanluat.com/wp-admin/css/colors/kIxtL8/

Targets

    • Target

      からの変更20 9月 21.doc

    • Size

      225KB

    • MD5

      75c9eb2270fb76b66b7d1df7f251e502

    • SHA1

      f817af654c08d50ab9d901af5f0abc5fe44b3ce5

    • SHA256

      5d66a83a1ecfc478d1521872ffaad56759f4650428823c1a456081ea6f01d642

    • SHA512

      27ac72df1783f38c3e93b529e63147702b3794a3247091aa30dbd6cd3904f2db79e620915ba1da966b1dd58a7273df40aa10e9e0ab3069f3dd59f9f5fd95684d

    • SSDEEP

      3072:f4PrXcuQuvpzm4bkiaMQgAlSVlK4fbSp0A:QDRv1m4bnQgISXKQep0A

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Target

      からの変更2020-09.doc

    • Size

      224KB

    • MD5

      c40e4affc580567e0e8698b6d08cf775

    • SHA1

      ece6ba8fe93bc0a0cfa9b0fd6069d3f1b4d85554

    • SHA256

      4e423abc3949a9d09540535f8b1fa4be04581c22773d77ad414ffda5f4ebc6b4

    • SHA512

      792c04294a3f02f1e408dbb72d813d3be8bc9abd050ad7660a81e12f82eefd73d81d3d9618791030ab15e54d789e5a00e1dd30ecbb9d1dab32031aeafd42cb57

    • SSDEEP

      3072:f4PrXcuQuvpzm4bkiaMQgAlSilK4fbSpIg:QDRv1m4bnQgISEKQepIg

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Target

      に修 20_09.doc

    • Size

      224KB

    • MD5

      81857e2cfc91ee57c91309dcb9833438

    • SHA1

      5662b5f18341adaf4009f12aa3ba29b77bae6f66

    • SHA256

      84315f06979037e5574e9f357fd9735774bef44f1b4507f6cbc6281c52ba352f

    • SHA512

      c1f99ec8d1ac264fecf6144e811f404fbf2bff9b6548d1f1fea9fb52f370f405e294a466c7c6cdb292a9c06d435c19a6be5c54817aea6dc5ef31b25709555296

    • SSDEEP

      3072:f4PrXcuQuvpzm4bkiaMQgAlSxlK4fbSpQg:QDRv1m4bnQgISbKQepQg

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Target

      変化2020_09_21.doc

    • Size

      226KB

    • MD5

      bed59b3b123aa2e8b1d36859b1b5c60b

    • SHA1

      2b725311b53c403b6d82e37b908b70524108492f

    • SHA256

      54e1a4176420673330f526f973cfbf239a62b620f783fb4a8ecdf0f5082995df

    • SHA512

      bf16b82b2389c6e19c5311ec9a1c366ee3f913177bf6251a9d1a9df0b421499b0e6caa2084e831952b449bfdaa5072950cf4a7ec306f281f0c82ed8df4708f1c

    • SSDEEP

      3072:f4PrXcuQuvpzm4bkiaMQgAlShlK4fbSp/A:QDRv1m4bnQgISrKQep/A

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Target

      変化20_09.doc

    • Size

      225KB

    • MD5

      f750b6fb7be2c9df4e52f7ef8498608d

    • SHA1

      2361d54a07b3e4be140af16c20936a76079b0313

    • SHA256

      0d2abc2f00006293db0665dc3b33534474e2683e346c2e567721b4ff7758ead8

    • SHA512

      37eeab67399d2e0bee4b726b26d3020920679f30f4ab1357870a777eab5f772f23a49e01b515e7b8a03cec6a875cc1e36d501d1cc4819bed5d584d6ba394f68e

    • SSDEEP

      3072:f4PrXcuQuvpzm4bkiaMQgAlSvlK4fbSp2A:QDRv1m4bnQgIS9KQep2A

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks