General

  • Target

    9989b8913c484d9fffeb228643fc4f0c39028b83a72c9c4d3ca33ec4ed956c68.doc

  • Size

    152KB

  • Sample

    200127-ftaha9e3b6

  • MD5

    2b05901f7fffd4ea7898206bd5bf8a7d

  • SHA1

    6f3036f3390a8d6282509b0909bbf00d8affaecd

  • SHA256

    9989b8913c484d9fffeb228643fc4f0c39028b83a72c9c4d3ca33ec4ed956c68

  • SHA512

    f0bf4feed1660aea32c8af83e70ddeda7b963bc0239e902604542c1af4ef0779044d2304dedd605e40fd5e16a914bee3616313520efb77ccda1d5a195ab47793

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://yochina.apps.zeroek.com/assets/GQK9Gly/

exe.dropper

http://www.bandarwinsbobet.com/wp-admin/7bw/

exe.dropper

http://test.pakspaservices.com/wp-content/Yi1j6O7/

exe.dropper

http://portal.meucompromisso.com/wp-admin/kQJ/

exe.dropper

https://wondersofgeorgia.com/wp-admin/jv7hvg/

Targets

    • Target

      9989b8913c484d9fffeb228643fc4f0c39028b83a72c9c4d3ca33ec4ed956c68.doc

    • Size

      152KB

    • MD5

      2b05901f7fffd4ea7898206bd5bf8a7d

    • SHA1

      6f3036f3390a8d6282509b0909bbf00d8affaecd

    • SHA256

      9989b8913c484d9fffeb228643fc4f0c39028b83a72c9c4d3ca33ec4ed956c68

    • SHA512

      f0bf4feed1660aea32c8af83e70ddeda7b963bc0239e902604542c1af4ef0779044d2304dedd605e40fd5e16a914bee3616313520efb77ccda1d5a195ab47793

    Score
    10/10
    • Process spawned unexpected child process

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks