General

  • Target

    8bf1359493ab66967a808ecdc5669f97a06b6dc6b09436ce05a1661cd1d4673e.doc

  • Size

    152KB

  • Sample

    200127-5g23rx2dcs

  • MD5

    ea3fd25a2d0c53c314b87e80ac3ea4b2

  • SHA1

    54fb6eefe4cd1866c23b128f6604b21fbd8ee331

  • SHA256

    8bf1359493ab66967a808ecdc5669f97a06b6dc6b09436ce05a1661cd1d4673e

  • SHA512

    d1a925106dd9280a2671da1bfcdb1fca7d9a9b545afe23b0db94f9c592013f6dd33c820d6db608f3113babe0e4f4d9e33d2a704296fb58a57bf353888d8cf1a6

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://yochina.apps.zeroek.com/assets/GQK9Gly/

exe.dropper

http://www.bandarwinsbobet.com/wp-admin/7bw/

exe.dropper

http://test.pakspaservices.com/wp-content/Yi1j6O7/

exe.dropper

http://portal.meucompromisso.com/wp-admin/kQJ/

exe.dropper

https://wondersofgeorgia.com/wp-admin/jv7hvg/

Targets

    • Target

      8bf1359493ab66967a808ecdc5669f97a06b6dc6b09436ce05a1661cd1d4673e.doc

    • Size

      152KB

    • MD5

      ea3fd25a2d0c53c314b87e80ac3ea4b2

    • SHA1

      54fb6eefe4cd1866c23b128f6604b21fbd8ee331

    • SHA256

      8bf1359493ab66967a808ecdc5669f97a06b6dc6b09436ce05a1661cd1d4673e

    • SHA512

      d1a925106dd9280a2671da1bfcdb1fca7d9a9b545afe23b0db94f9c592013f6dd33c820d6db608f3113babe0e4f4d9e33d2a704296fb58a57bf353888d8cf1a6

    Score
    10/10
    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks