General

  • Target

    4e423abc3949a9d09540535f8b1fa4be04581c22773d77ad414ffda5f4ebc6b4

  • Size

    224KB

  • Sample

    241120-z6n6ratmbt

  • MD5

    c40e4affc580567e0e8698b6d08cf775

  • SHA1

    ece6ba8fe93bc0a0cfa9b0fd6069d3f1b4d85554

  • SHA256

    4e423abc3949a9d09540535f8b1fa4be04581c22773d77ad414ffda5f4ebc6b4

  • SHA512

    792c04294a3f02f1e408dbb72d813d3be8bc9abd050ad7660a81e12f82eefd73d81d3d9618791030ab15e54d789e5a00e1dd30ecbb9d1dab32031aeafd42cb57

  • SSDEEP

    3072:f4PrXcuQuvpzm4bkiaMQgAlSilK4fbSpIg:QDRv1m4bnQgISEKQepIg

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://marmolhi.com/_vti_bin/0nNKKlWZ4/

exe.dropper

https://comerciopuravida.com/wp-admin/qqUV32Q/

exe.dropper

http://www.closmaq.com.br/wp-admin/nc/

exe.dropper

http://pulseti.com/isla/61D/

exe.dropper

https://hotelunique.com/teste/oxda9J0BvF/

exe.dropper

http://greensync.com.br/aspnet_clientOld/Xyicd/

exe.dropper

http://muabannodanluat.com/wp-admin/css/colors/kIxtL8/

Targets

    • Target

      4e423abc3949a9d09540535f8b1fa4be04581c22773d77ad414ffda5f4ebc6b4

    • Size

      224KB

    • MD5

      c40e4affc580567e0e8698b6d08cf775

    • SHA1

      ece6ba8fe93bc0a0cfa9b0fd6069d3f1b4d85554

    • SHA256

      4e423abc3949a9d09540535f8b1fa4be04581c22773d77ad414ffda5f4ebc6b4

    • SHA512

      792c04294a3f02f1e408dbb72d813d3be8bc9abd050ad7660a81e12f82eefd73d81d3d9618791030ab15e54d789e5a00e1dd30ecbb9d1dab32031aeafd42cb57

    • SSDEEP

      3072:f4PrXcuQuvpzm4bkiaMQgAlSilK4fbSpIg:QDRv1m4bnQgISEKQepIg

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks