General

  • Target

    986a28cc6b6165931375401925849e4182df92e8468fadfca7695d70f49a8213

  • Size

    122KB

  • Sample

    241120-z14n9ashrc

  • MD5

    2136126af329fdbbe2daa91c818cf987

  • SHA1

    dea8921d1758aacb5a55d804280a8f0f089278ff

  • SHA256

    986a28cc6b6165931375401925849e4182df92e8468fadfca7695d70f49a8213

  • SHA512

    2d264fa369b07ab69c8843502b1e6adaf2a8dfd4f85cafb6f58893761895bf6546e25729d5e6a149b3787f3cc4f0c22e82867c1468223d8944757dd4ab585d4d

  • SSDEEP

    3072:YOehv7q2Pjx45uoDGTj+5xtekEvi8/dgZBFoTLTmxW5WxVe+41WsdiXUchlL:xehv7q2Pjx45uoDGTj+5xtFEvi8/dgZ3

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://midnightsilvercrafters.com/store/wBjNOUw/

exe.dropper

http://tempral.com/NATE_05_22_2009/BI710N4cQ6R3/

exe.dropper

https://redington.karmatechmediaworks.com/wp-content/3JVuVx7QUM/

exe.dropper

https://uhc.karmatechmediaworks.com/wp-content/0EqfdeznntlOpaIP2Qv/

exe.dropper

https://servilogic.net/b/14hqrdyP0Z3WsbQib8/

exe.dropper

https://comezmuhendislik.com/ljfrmm/VTpHRFWoORAHnRQ3aQL/

exe.dropper

http://webmail.glemedical.com/wp-content/J1M2xxodH/

exe.dropper

http://toto.karmatechmediaworks.com/wp-content/i826vbcVgRJ/

exe.dropper

https://golfpia.karmatechmediaworks.com/wp-content/oEicpDnEkk/

exe.dropper

https://fortiuspharma.com/y6krss/EGm347cqj5/

exe.dropper

https://garyjharris.com/cgi-bin/0hH/

exe.dropper

https://vietnam.karmatechmediaworks.com/wp-content/PfSVQagusZy7AaMw/

exe.dropper

https://vinculinc.karmatechmediaworks.com/wp-content/VlcOPPwgidWlXDJNs6/

Targets

    • Target

      986a28cc6b6165931375401925849e4182df92e8468fadfca7695d70f49a8213

    • Size

      122KB

    • MD5

      2136126af329fdbbe2daa91c818cf987

    • SHA1

      dea8921d1758aacb5a55d804280a8f0f089278ff

    • SHA256

      986a28cc6b6165931375401925849e4182df92e8468fadfca7695d70f49a8213

    • SHA512

      2d264fa369b07ab69c8843502b1e6adaf2a8dfd4f85cafb6f58893761895bf6546e25729d5e6a149b3787f3cc4f0c22e82867c1468223d8944757dd4ab585d4d

    • SSDEEP

      3072:YOehv7q2Pjx45uoDGTj+5xtekEvi8/dgZBFoTLTmxW5WxVe+41WsdiXUchlL:xehv7q2Pjx45uoDGTj+5xtFEvi8/dgZ3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks