General

  • Target

    dfde7333bf1e1496475bae5462fd5bbc3c1cb32f48d4289ba1202c62962a1a43

  • Size

    223KB

  • Sample

    241120-zzzc5stkhv

  • MD5

    788528655c447bf2ba012ac7300d10fa

  • SHA1

    52203fb658426f5077836c4a8cf9e8e36c3b74b0

  • SHA256

    dfde7333bf1e1496475bae5462fd5bbc3c1cb32f48d4289ba1202c62962a1a43

  • SHA512

    c7bc72db66535ddd0600d3662341fb496ea7f9269be0bc27f6fe49850e830c4f5e5a6304e0bc1c642640f360dd63bb479cdab1957af0231c5b2204eeb572513e

  • SSDEEP

    3072:Zz4PrXcuQuvpzm4bkiaMQgAlSazbSphmq4P:ZMDRv1m4bnQgISAepgqm

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://marmolhi.com/_vti_bin/0nNKKlWZ4/

exe.dropper

https://comerciopuravida.com/wp-admin/qqUV32Q/

exe.dropper

http://www.closmaq.com.br/wp-admin/nc/

exe.dropper

http://pulseti.com/isla/61D/

exe.dropper

https://hotelunique.com/teste/oxda9J0BvF/

exe.dropper

http://greensync.com.br/aspnet_clientOld/Xyicd/

exe.dropper

http://muabannodanluat.com/wp-admin/css/colors/kIxtL8/

Targets

    • Target

      dfde7333bf1e1496475bae5462fd5bbc3c1cb32f48d4289ba1202c62962a1a43

    • Size

      223KB

    • MD5

      788528655c447bf2ba012ac7300d10fa

    • SHA1

      52203fb658426f5077836c4a8cf9e8e36c3b74b0

    • SHA256

      dfde7333bf1e1496475bae5462fd5bbc3c1cb32f48d4289ba1202c62962a1a43

    • SHA512

      c7bc72db66535ddd0600d3662341fb496ea7f9269be0bc27f6fe49850e830c4f5e5a6304e0bc1c642640f360dd63bb479cdab1957af0231c5b2204eeb572513e

    • SSDEEP

      3072:Zz4PrXcuQuvpzm4bkiaMQgAlSazbSphmq4P:ZMDRv1m4bnQgISAepgqm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks