General

  • Target

    62217a9a7da057afde675946b47758abd750905a917f054804611fc9b0ab3b6f.doc

  • Size

    152KB

  • Sample

    200127-gx413jsjex

  • MD5

    0f95ea6fc0dffc0df99260b60d2ff7ca

  • SHA1

    ce2e8d7d63ca8cc68024a813cf09425db24611dc

  • SHA256

    62217a9a7da057afde675946b47758abd750905a917f054804611fc9b0ab3b6f

  • SHA512

    b83a90ee27b32d49d0de199e285ddd08ec68e2a2644109ac59b98ab15ba8f39f9aced3b64e1b7d9c6d7a630a392a2ee6782e5a224e99e27e1dac8f5c31209c5c

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://yochina.apps.zeroek.com/assets/GQK9Gly/

exe.dropper

http://www.bandarwinsbobet.com/wp-admin/7bw/

exe.dropper

http://test.pakspaservices.com/wp-content/Yi1j6O7/

exe.dropper

http://portal.meucompromisso.com/wp-admin/kQJ/

exe.dropper

https://wondersofgeorgia.com/wp-admin/jv7hvg/

Targets

    • Target

      62217a9a7da057afde675946b47758abd750905a917f054804611fc9b0ab3b6f.doc

    • Size

      152KB

    • MD5

      0f95ea6fc0dffc0df99260b60d2ff7ca

    • SHA1

      ce2e8d7d63ca8cc68024a813cf09425db24611dc

    • SHA256

      62217a9a7da057afde675946b47758abd750905a917f054804611fc9b0ab3b6f

    • SHA512

      b83a90ee27b32d49d0de199e285ddd08ec68e2a2644109ac59b98ab15ba8f39f9aced3b64e1b7d9c6d7a630a392a2ee6782e5a224e99e27e1dac8f5c31209c5c

    Score
    10/10
    • Process spawned unexpected child process

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks