General

  • Target

    d355160c7b170737c3e089287ecf40729295983f77f14b2d38bd1cbc4ecdd171

  • Size

    183KB

  • Sample

    191213-a9lmbp1xzs

  • MD5

    f3bfd526f741abee73f32c0f302a98e7

  • SHA1

    de060cd15c2070a91bec9d8f79ea7b5063324f1f

  • SHA256

    d355160c7b170737c3e089287ecf40729295983f77f14b2d38bd1cbc4ecdd171

  • SHA512

    ecb87d0f0a47a7e780dbf68d5f2b16f1ab1e50d8fa4c3060dd50f474aa77d69e52fa1f36d786f24b47440c432b1cadbbf13c9d6e5d8151cb68dc014b65ceb3d8

Score
8/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://bahcelievler-rotary.org/wp-admin/x4PHK0/

exe.dropper

https://sageth.net/wp-content/fu9yz/

exe.dropper

https://newlandred.com/wp-snapshots/CsfcooA/

exe.dropper

https://hellothuoctot.com/wp-content/VzMjXw/

exe.dropper

http://www.enegix.com/wp-includes/21fap/

Targets

    • Target

      d355160c7b170737c3e089287ecf40729295983f77f14b2d38bd1cbc4ecdd171

    • Size

      183KB

    • MD5

      f3bfd526f741abee73f32c0f302a98e7

    • SHA1

      de060cd15c2070a91bec9d8f79ea7b5063324f1f

    • SHA256

      d355160c7b170737c3e089287ecf40729295983f77f14b2d38bd1cbc4ecdd171

    • SHA512

      ecb87d0f0a47a7e780dbf68d5f2b16f1ab1e50d8fa4c3060dd50f474aa77d69e52fa1f36d786f24b47440c432b1cadbbf13c9d6e5d8151cb68dc014b65ceb3d8

    Score
    8/10
    • Executes dropped EXE

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v6

Tasks