General

  • Target

    7f70ec7eacae7c470309463456d267e8d8564db88fc2c2f4a4c06fad7b734f9c.doc

  • Size

    152KB

  • Sample

    200127-9gjkzy4b26

  • MD5

    0943baf0c88e90cc7cf31432c3db3c9d

  • SHA1

    227f9e210b0bab0ed6ce2d3b18dc9b738cf30d38

  • SHA256

    7f70ec7eacae7c470309463456d267e8d8564db88fc2c2f4a4c06fad7b734f9c

  • SHA512

    150ef9ba0630bd2311e21599a5c1f2edd4cd68836e483a7c4afc9c4fab860a90d0bae44d38c5ab919d078cf91d2702922027b8a7a646aa067d82a581fa15ed39

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://yochina.apps.zeroek.com/assets/GQK9Gly/

exe.dropper

http://www.bandarwinsbobet.com/wp-admin/7bw/

exe.dropper

http://test.pakspaservices.com/wp-content/Yi1j6O7/

exe.dropper

http://portal.meucompromisso.com/wp-admin/kQJ/

exe.dropper

https://wondersofgeorgia.com/wp-admin/jv7hvg/

Targets

    • Target

      7f70ec7eacae7c470309463456d267e8d8564db88fc2c2f4a4c06fad7b734f9c.doc

    • Size

      152KB

    • MD5

      0943baf0c88e90cc7cf31432c3db3c9d

    • SHA1

      227f9e210b0bab0ed6ce2d3b18dc9b738cf30d38

    • SHA256

      7f70ec7eacae7c470309463456d267e8d8564db88fc2c2f4a4c06fad7b734f9c

    • SHA512

      150ef9ba0630bd2311e21599a5c1f2edd4cd68836e483a7c4afc9c4fab860a90d0bae44d38c5ab919d078cf91d2702922027b8a7a646aa067d82a581fa15ed39

    Score
    10/10
    • Process spawned unexpected child process

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks