General

  • Target

    83ec3954c03eb81cd8584775607085a5908b6bf27592c35f89a2edfc4b4cf2e3.doc

  • Size

    151KB

  • Sample

    200127-9jscfdpycs

  • MD5

    cce3ab148979e32ed68680764541c6e9

  • SHA1

    f2ccc37644182db251639c754fb5ae554a615eea

  • SHA256

    83ec3954c03eb81cd8584775607085a5908b6bf27592c35f89a2edfc4b4cf2e3

  • SHA512

    3923e038593b9488d3bb0e7847d637549514760be8d8ed8341b8a1918565a30f5f9fd37b29d6911c544f8dbbe2b4233555f05d3f40bc77d13edfd66b9457e98c

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://delhisexclinic.com/zds/jUzItNFoNN/

exe.dropper

https://lelangg.online/uydlcvg/xoZAiAes/

exe.dropper

https://usispf.org/wp-admin/vjWaya/

exe.dropper

https://www.sexylady.space/wp-admin/JM/

exe.dropper

https://www.metropolnet.gr/cgi-bin/eP1hbutDbo/

Targets

    • Target

      83ec3954c03eb81cd8584775607085a5908b6bf27592c35f89a2edfc4b4cf2e3.doc

    • Size

      151KB

    • MD5

      cce3ab148979e32ed68680764541c6e9

    • SHA1

      f2ccc37644182db251639c754fb5ae554a615eea

    • SHA256

      83ec3954c03eb81cd8584775607085a5908b6bf27592c35f89a2edfc4b4cf2e3

    • SHA512

      3923e038593b9488d3bb0e7847d637549514760be8d8ed8341b8a1918565a30f5f9fd37b29d6911c544f8dbbe2b4233555f05d3f40bc77d13edfd66b9457e98c

    Score
    10/10
    • Process spawned unexpected child process

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks