General

  • Target

    21d6ef52191be9e8c28cad9d827aa0dcdd18ddc7a51413d2bbee37e62c40d6d5

  • Size

    56KB

  • Sample

    241208-1zzvcavmfz

  • MD5

    2467c15c5166bd497fd3c43f7ffcb710

  • SHA1

    eb4032e8bcf843a1f629e193a53ce4a013de445c

  • SHA256

    21d6ef52191be9e8c28cad9d827aa0dcdd18ddc7a51413d2bbee37e62c40d6d5

  • SHA512

    671221f988c36934f2420f6df86bd9719f1a99ff6a3d63863462a4584e7cc1a67b796d2989224e828fa418bb8c2377340301e8ec6ae4b876e132c6b0f0a24a3b

  • SSDEEP

    1536:ok3hOdsylKlgryzc4bNhZFGzE+cL2knAzqC+fzFpyiE:ok3hOdsylKlgryzc4bNhZFGzE+cL2kn9

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://igyygyigus.com/new/smscscript090002000.exe

Targets

    • Target

      21d6ef52191be9e8c28cad9d827aa0dcdd18ddc7a51413d2bbee37e62c40d6d5

    • Size

      56KB

    • MD5

      2467c15c5166bd497fd3c43f7ffcb710

    • SHA1

      eb4032e8bcf843a1f629e193a53ce4a013de445c

    • SHA256

      21d6ef52191be9e8c28cad9d827aa0dcdd18ddc7a51413d2bbee37e62c40d6d5

    • SHA512

      671221f988c36934f2420f6df86bd9719f1a99ff6a3d63863462a4584e7cc1a67b796d2989224e828fa418bb8c2377340301e8ec6ae4b876e132c6b0f0a24a3b

    • SSDEEP

      1536:ok3hOdsylKlgryzc4bNhZFGzE+cL2knAzqC+fzFpyiE:ok3hOdsylKlgryzc4bNhZFGzE+cL2kn9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks