General

  • Target

    f030d9ec0067ad5dc4e908773e33e0cdedad6a70dfe9ad1668f8f948cfcbddf2.doc

  • Size

    152KB

  • Sample

    200127-cn5e3avk66

  • MD5

    516641cd5f6a69f06cdaa335a463361d

  • SHA1

    546f36bb0dc7d0a2153d5649c7e337fe44edcad0

  • SHA256

    f030d9ec0067ad5dc4e908773e33e0cdedad6a70dfe9ad1668f8f948cfcbddf2

  • SHA512

    365b2bfc607ee8037599ea2a00e6d49ad1b25e75f2084760376f27687a3d80638998073c782e8ad0c00dc9ea72f8eb08c62a5b3663eb4198dd5894e1ec0cbf3c

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://yochina.apps.zeroek.com/assets/GQK9Gly/

exe.dropper

http://www.bandarwinsbobet.com/wp-admin/7bw/

exe.dropper

http://test.pakspaservices.com/wp-content/Yi1j6O7/

exe.dropper

http://portal.meucompromisso.com/wp-admin/kQJ/

exe.dropper

https://wondersofgeorgia.com/wp-admin/jv7hvg/

Targets

    • Target

      f030d9ec0067ad5dc4e908773e33e0cdedad6a70dfe9ad1668f8f948cfcbddf2.doc

    • Size

      152KB

    • MD5

      516641cd5f6a69f06cdaa335a463361d

    • SHA1

      546f36bb0dc7d0a2153d5649c7e337fe44edcad0

    • SHA256

      f030d9ec0067ad5dc4e908773e33e0cdedad6a70dfe9ad1668f8f948cfcbddf2

    • SHA512

      365b2bfc607ee8037599ea2a00e6d49ad1b25e75f2084760376f27687a3d80638998073c782e8ad0c00dc9ea72f8eb08c62a5b3663eb4198dd5894e1ec0cbf3c

    Score
    10/10
    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Enterprise v6

Tasks