General

  • Target

    0a73805c5e818514004fc8df6d731d2357647c7685234dba6cff3ef8d22f5b07

  • Size

    61KB

  • Sample

    241120-xtqspsscqq

  • MD5

    579c5628211b5a8c97c8a0a1ae3b4c07

  • SHA1

    42e28e071054b879720158e2590247be176c0498

  • SHA256

    0a73805c5e818514004fc8df6d731d2357647c7685234dba6cff3ef8d22f5b07

  • SHA512

    696b911c53c45554369a65d4730874a437861782357f267ba6cb6546a2f7b9256d33d514c4d042c270a8cd064fa00b62442c276287072d068ce5dc8792bbf9d9

  • SSDEEP

    1536:Y3df8V59Mm0F7GNolPlsiPjBhmbLhAVo8vuazGE08ATl:Yg/u6NolKq+xr82V8ATl

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://geevida.com/wp-admin/DhWo/

exe.dropper

http://elrofanfoods.com/wp-admin/qc/

exe.dropper

https://volcanict.com/wp-admin/LfWFF/

exe.dropper

http://xmjadever.com/wp-admin/FTOXI/

exe.dropper

https://gbmcleaning.com/1/Gdk5eqv/

exe.dropper

https://kingchuen.com/cgi-bin/KQ/

exe.dropper

https://billc46.com/uf65/H4/

Targets

    • Target

      b114281a6664f44018353cae8a6f00cea1d34854e2942f01a9e027d2ab333b9d

    • Size

      170KB

    • MD5

      e76976972a1c472103da35a58f2b7e20

    • SHA1

      13741661f6dd60c885900e9d1f1a8534df9f5cda

    • SHA256

      b114281a6664f44018353cae8a6f00cea1d34854e2942f01a9e027d2ab333b9d

    • SHA512

      e0fb97de3761f8359d757ad99ebfb88242d9dc571516f24247c5c0572e9b5e376554aea65628379b5f271fac539efef57c96c0f9593506497a88f6a2a0435a05

    • SSDEEP

      1536:AGGGGGGGGGG2xJLEt+LaaGGGGGGGGGGjLo9xiP340Vzy7dUWqHe43d9T96aEH5is:yrfrzOH98ipgWPLQSq/1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks