General

  • Target

    5e0ce9e9f2697d96cbc5573494702c5049f097c173d2bffba28ed4487d759e4c.doc

  • Size

    152KB

  • Sample

    200127-gmsklar3pa

  • MD5

    e698949b0cdb6c2f5a8bd8e82628f16b

  • SHA1

    49d305ab0d535de58ea3c569fee8344fc3c2e968

  • SHA256

    5e0ce9e9f2697d96cbc5573494702c5049f097c173d2bffba28ed4487d759e4c

  • SHA512

    393afaf856b33232f730b93f46493140762ba5bdbed4821a22b6b927d1c464ef66d0cc3551e7b5b984273d40ad60f1a07e858a229961d7f26d8e0b77e282742f

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://yochina.apps.zeroek.com/assets/GQK9Gly/

exe.dropper

http://www.bandarwinsbobet.com/wp-admin/7bw/

exe.dropper

http://test.pakspaservices.com/wp-content/Yi1j6O7/

exe.dropper

http://portal.meucompromisso.com/wp-admin/kQJ/

exe.dropper

https://wondersofgeorgia.com/wp-admin/jv7hvg/

Targets

    • Target

      5e0ce9e9f2697d96cbc5573494702c5049f097c173d2bffba28ed4487d759e4c.doc

    • Size

      152KB

    • MD5

      e698949b0cdb6c2f5a8bd8e82628f16b

    • SHA1

      49d305ab0d535de58ea3c569fee8344fc3c2e968

    • SHA256

      5e0ce9e9f2697d96cbc5573494702c5049f097c173d2bffba28ed4487d759e4c

    • SHA512

      393afaf856b33232f730b93f46493140762ba5bdbed4821a22b6b927d1c464ef66d0cc3551e7b5b984273d40ad60f1a07e858a229961d7f26d8e0b77e282742f

    Score
    10/10
    • Process spawned unexpected child process

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks