General

  • Target

    700baa1e26d65c486ecc425d821e10f9956810ca626558166360fb602aacf540.exe

  • Size

    89KB

  • Sample

    241122-jjf9mawqdw

  • MD5

    c300cc39e57a63a2f32141a87e5a4667

  • SHA1

    aaf889a96a3c0a9c7aea63769855c2951f752aa6

  • SHA256

    700baa1e26d65c486ecc425d821e10f9956810ca626558166360fb602aacf540

  • SHA512

    9cde6f3e2ed24462b60fab53234b5fe602434eb070e2f921989d4e6f8c8a398df1ca220219820f37418f23f98c8a156ee91107bb721a3dc394f4700e82aaf463

  • SSDEEP

    1536:zMFWeATa+8j6IuQ1crSgUZdnXAvU/XPNwsWh/5tDdWcFfjEQM3U0LRMaEr:I7Z+LIB/n4U/fid9jpNfjEB37MaEr

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githack.com/i87924hgasdhg/hgytiryty/master/busybox

Targets

    • Target

      700baa1e26d65c486ecc425d821e10f9956810ca626558166360fb602aacf540.exe

    • Size

      89KB

    • MD5

      c300cc39e57a63a2f32141a87e5a4667

    • SHA1

      aaf889a96a3c0a9c7aea63769855c2951f752aa6

    • SHA256

      700baa1e26d65c486ecc425d821e10f9956810ca626558166360fb602aacf540

    • SHA512

      9cde6f3e2ed24462b60fab53234b5fe602434eb070e2f921989d4e6f8c8a398df1ca220219820f37418f23f98c8a156ee91107bb721a3dc394f4700e82aaf463

    • SSDEEP

      1536:zMFWeATa+8j6IuQ1crSgUZdnXAvU/XPNwsWh/5tDdWcFfjEQM3U0LRMaEr:I7Z+LIB/n4U/fid9jpNfjEB37MaEr

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks