General

  • Target

    874ee3c57ce7d5dcbfcbeb72f6f6458eb9964530fba01f5bf892b612c7e73077.doc

  • Size

    152KB

  • Sample

    200127-9ebxzrksxj

  • MD5

    b0de139ffa383354377f0d2fe65458ab

  • SHA1

    24d82bf6a09b683fa9ff92bbb9184cab33058128

  • SHA256

    874ee3c57ce7d5dcbfcbeb72f6f6458eb9964530fba01f5bf892b612c7e73077

  • SHA512

    5e96a6b2f3d134d90911add2524192c9e7c2231d8e693d2c97ae572f9bb61f390188849a5407eaa8584d32aac45e8348d8c0df09412efad5bc55da2d290fbe1b

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://yochina.apps.zeroek.com/assets/GQK9Gly/

exe.dropper

http://www.bandarwinsbobet.com/wp-admin/7bw/

exe.dropper

http://test.pakspaservices.com/wp-content/Yi1j6O7/

exe.dropper

http://portal.meucompromisso.com/wp-admin/kQJ/

exe.dropper

https://wondersofgeorgia.com/wp-admin/jv7hvg/

Targets

    • Target

      874ee3c57ce7d5dcbfcbeb72f6f6458eb9964530fba01f5bf892b612c7e73077.doc

    • Size

      152KB

    • MD5

      b0de139ffa383354377f0d2fe65458ab

    • SHA1

      24d82bf6a09b683fa9ff92bbb9184cab33058128

    • SHA256

      874ee3c57ce7d5dcbfcbeb72f6f6458eb9964530fba01f5bf892b612c7e73077

    • SHA512

      5e96a6b2f3d134d90911add2524192c9e7c2231d8e693d2c97ae572f9bb61f390188849a5407eaa8584d32aac45e8348d8c0df09412efad5bc55da2d290fbe1b

    Score
    10/10
    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks