General

  • Target

    b4192c958bdc5e2bed2b4ad66659307277a2f84827342480eef3eba5adeba0cf

  • Size

    185KB

  • Sample

    191213-48qtymfn7a

  • MD5

    dadf58e8ca8c70aabf43b457afbeee94

  • SHA1

    0edde5810f5ff23a4f5a6bee6175241dd9109708

  • SHA256

    b4192c958bdc5e2bed2b4ad66659307277a2f84827342480eef3eba5adeba0cf

  • SHA512

    b914970cc8c219cb30b82c0717bcef067f85dada249e831fc6e97dc5d67cd2d58a13122f438221e2d2e0895a037d62b6727eec85b577865e364987e5a83a8e7e

Score
8/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://sm-conference.info/program/yng1l-j6l3m8p-37065190/

exe.dropper

https://dscreationssite.com/Planninginprogress/EZrSNOm/

exe.dropper

https://innovationhackers.com.mx/wiki/8t9c-bi5psx8545-2918/

exe.dropper

http://www.windo360.com/qkoh/z3dec-5lxb-43423/

exe.dropper

http://www.cpawhy.com/wp-admin/8qy5gi4xp-k42nca-661/

Targets

    • Target

      b4192c958bdc5e2bed2b4ad66659307277a2f84827342480eef3eba5adeba0cf

    • Size

      185KB

    • MD5

      dadf58e8ca8c70aabf43b457afbeee94

    • SHA1

      0edde5810f5ff23a4f5a6bee6175241dd9109708

    • SHA256

      b4192c958bdc5e2bed2b4ad66659307277a2f84827342480eef3eba5adeba0cf

    • SHA512

      b914970cc8c219cb30b82c0717bcef067f85dada249e831fc6e97dc5d67cd2d58a13122f438221e2d2e0895a037d62b6727eec85b577865e364987e5a83a8e7e

    Score
    8/10
    • Executes dropped EXE

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks