General

  • Target

    22a9879ed2647f7a2d634c2bce52bd183e8c0fd9073477758afe3080ed2f83a8

  • Size

    105KB

  • Sample

    241122-ct4dkssmfy

  • MD5

    ed8ef17ea6d7cf17d582cf27c0026b01

  • SHA1

    8a876c8c80f607347d11d07e262b8c59396ef115

  • SHA256

    22a9879ed2647f7a2d634c2bce52bd183e8c0fd9073477758afe3080ed2f83a8

  • SHA512

    01c454eebf9246c987db12455a68bd72c6208197b1b1511afa9888f2dc5467f4153e12c8ba41de33a32f8cbf2d38b38a8c2491bd5d05a5ae48fa91d06b4ccd57

  • SSDEEP

    1536:fuwocn1kp59gxBK85fBU8NGo67Di7lSbKexUtrxBk7PvwVIvbVJXKDiFayL:g41k/W48+8NGoGD0loKexMjIVJaDiFa

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://liarla.com/RqAjQLJlx

exe.dropper

http://espasat.com/1YbH45y

exe.dropper

http://latuconference.com/wp-content/uploads/vvl9XHG

exe.dropper

http://dirtyactionsports.com/vVgr4dva

exe.dropper

http://demign.com/PGT53cb

Targets

    • Target

      22a9879ed2647f7a2d634c2bce52bd183e8c0fd9073477758afe3080ed2f83a8

    • Size

      105KB

    • MD5

      ed8ef17ea6d7cf17d582cf27c0026b01

    • SHA1

      8a876c8c80f607347d11d07e262b8c59396ef115

    • SHA256

      22a9879ed2647f7a2d634c2bce52bd183e8c0fd9073477758afe3080ed2f83a8

    • SHA512

      01c454eebf9246c987db12455a68bd72c6208197b1b1511afa9888f2dc5467f4153e12c8ba41de33a32f8cbf2d38b38a8c2491bd5d05a5ae48fa91d06b4ccd57

    • SSDEEP

      1536:fuwocn1kp59gxBK85fBU8NGo67Di7lSbKexUtrxBk7PvwVIvbVJXKDiFayL:g41k/W48+8NGoGD0loKexMjIVJaDiFa

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

MITRE ATT&CK Enterprise v15

Tasks