General

  • Target

    c0bffef212cdfa54e5d7057eebf7c6b3953c6f33edbffd58297bd1318528e435.doc

  • Size

    151KB

  • Sample

    200127-f5qal29w5a

  • MD5

    8e466f06b16a579780f6249b147c70af

  • SHA1

    f0c0431bc399ebf01c79870c66f4964af394f8fb

  • SHA256

    c0bffef212cdfa54e5d7057eebf7c6b3953c6f33edbffd58297bd1318528e435

  • SHA512

    ecf5d517e0e422558fcca58462594faec4c319a1e3e392b4b5cec6b0950dbc98c4025b5ed85ab0aef43ab9b347c1337867f4b4912f105167f8638d8257274411

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://delhisexclinic.com/zds/jUzItNFoNN/

exe.dropper

https://lelangg.online/uydlcvg/xoZAiAes/

exe.dropper

https://usispf.org/wp-admin/vjWaya/

exe.dropper

https://www.sexylady.space/wp-admin/JM/

exe.dropper

https://www.metropolnet.gr/cgi-bin/eP1hbutDbo/

Targets

    • Target

      c0bffef212cdfa54e5d7057eebf7c6b3953c6f33edbffd58297bd1318528e435.doc

    • Size

      151KB

    • MD5

      8e466f06b16a579780f6249b147c70af

    • SHA1

      f0c0431bc399ebf01c79870c66f4964af394f8fb

    • SHA256

      c0bffef212cdfa54e5d7057eebf7c6b3953c6f33edbffd58297bd1318528e435

    • SHA512

      ecf5d517e0e422558fcca58462594faec4c319a1e3e392b4b5cec6b0950dbc98c4025b5ed85ab0aef43ab9b347c1337867f4b4912f105167f8638d8257274411

    Score
    10/10
    • Process spawned unexpected child process

    • Executes dropped EXE

    • Modifies system certificate store

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks