General

  • Target

    328d8d0de05f5c2c1a23cb905c633f3aef6d21fbf31e5500abe5327959560c25.doc

  • Size

    152KB

  • Sample

    200127-fh94mz7yyj

  • MD5

    8a716ce6adcd8c594c52fbe1735fb0d4

  • SHA1

    a85dae684f20282e11930987e250674df41fd40b

  • SHA256

    328d8d0de05f5c2c1a23cb905c633f3aef6d21fbf31e5500abe5327959560c25

  • SHA512

    b0c56aed51982bd316479dfdfb74108a1b66146859e689a120dde0e4bfc0788b894f96d71de1c11ab291ee954012ddfee4bf473531973da643c2955f981b26c8

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://yochina.apps.zeroek.com/assets/GQK9Gly/

exe.dropper

http://www.bandarwinsbobet.com/wp-admin/7bw/

exe.dropper

http://test.pakspaservices.com/wp-content/Yi1j6O7/

exe.dropper

http://portal.meucompromisso.com/wp-admin/kQJ/

exe.dropper

https://wondersofgeorgia.com/wp-admin/jv7hvg/

Targets

    • Target

      328d8d0de05f5c2c1a23cb905c633f3aef6d21fbf31e5500abe5327959560c25.doc

    • Size

      152KB

    • MD5

      8a716ce6adcd8c594c52fbe1735fb0d4

    • SHA1

      a85dae684f20282e11930987e250674df41fd40b

    • SHA256

      328d8d0de05f5c2c1a23cb905c633f3aef6d21fbf31e5500abe5327959560c25

    • SHA512

      b0c56aed51982bd316479dfdfb74108a1b66146859e689a120dde0e4bfc0788b894f96d71de1c11ab291ee954012ddfee4bf473531973da643c2955f981b26c8

    Score
    10/10
    • Process spawned unexpected child process

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks