General

  • Target

    2010a35082eff3568cc93f0ae0b78b0c3c426d5f4b17d79380b0966fdf98caaf

  • Size

    56KB

  • Sample

    241208-11tdysvmht

  • MD5

    cdddcb8694ce3a5ed4966c715a2e382a

  • SHA1

    92d7ea6ef276c96188a5cafd30ac1a5c2a716eef

  • SHA256

    2010a35082eff3568cc93f0ae0b78b0c3c426d5f4b17d79380b0966fdf98caaf

  • SHA512

    668dd75f50ed7af639adc9d46d225790e8f59d3e469628ffb095ff5fdc1d51f37fe6d9a0769a5daeb228564abfd72c10fcfd56d6387e438c5c5165fc454122a8

  • SSDEEP

    1536:lk3hOdsylKlgryzc4bNhZFGzE+cL2knAzqCXHzFp/iE:lk3hOdsylKlgryzc4bNhZFGzE+cL2knv

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://igyygyigus.com/new/smscscript090002000.exe

Targets

    • Target

      2010a35082eff3568cc93f0ae0b78b0c3c426d5f4b17d79380b0966fdf98caaf

    • Size

      56KB

    • MD5

      cdddcb8694ce3a5ed4966c715a2e382a

    • SHA1

      92d7ea6ef276c96188a5cafd30ac1a5c2a716eef

    • SHA256

      2010a35082eff3568cc93f0ae0b78b0c3c426d5f4b17d79380b0966fdf98caaf

    • SHA512

      668dd75f50ed7af639adc9d46d225790e8f59d3e469628ffb095ff5fdc1d51f37fe6d9a0769a5daeb228564abfd72c10fcfd56d6387e438c5c5165fc454122a8

    • SSDEEP

      1536:lk3hOdsylKlgryzc4bNhZFGzE+cL2knAzqCXHzFp/iE:lk3hOdsylKlgryzc4bNhZFGzE+cL2knv

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks