General

  • Target

    7cd4120783d8e406579fa472ead1ed7ce68069bce55e73838a6655e22c0c4c0b.doc

  • Size

    152KB

  • Sample

    200127-mx11vh3v42

  • MD5

    e6bbcaf6f150ab0c0ac48b3ae0cdcb36

  • SHA1

    f8e2490e14c9ed9040c82e35f82f49e70175562d

  • SHA256

    7cd4120783d8e406579fa472ead1ed7ce68069bce55e73838a6655e22c0c4c0b

  • SHA512

    0c7e6ba6943efb9e2d08c6113e77e1c9dd4a96654c62b37bd5d11e5007ed79476d9dee713cdfb0ba2ed0e3561f3c3b290bb52e95563b51b0be5b53e25708597b

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://yochina.apps.zeroek.com/assets/GQK9Gly/

exe.dropper

http://www.bandarwinsbobet.com/wp-admin/7bw/

exe.dropper

http://test.pakspaservices.com/wp-content/Yi1j6O7/

exe.dropper

http://portal.meucompromisso.com/wp-admin/kQJ/

exe.dropper

https://wondersofgeorgia.com/wp-admin/jv7hvg/

Targets

    • Target

      7cd4120783d8e406579fa472ead1ed7ce68069bce55e73838a6655e22c0c4c0b.doc

    • Size

      152KB

    • MD5

      e6bbcaf6f150ab0c0ac48b3ae0cdcb36

    • SHA1

      f8e2490e14c9ed9040c82e35f82f49e70175562d

    • SHA256

      7cd4120783d8e406579fa472ead1ed7ce68069bce55e73838a6655e22c0c4c0b

    • SHA512

      0c7e6ba6943efb9e2d08c6113e77e1c9dd4a96654c62b37bd5d11e5007ed79476d9dee713cdfb0ba2ed0e3561f3c3b290bb52e95563b51b0be5b53e25708597b

    Score
    10/10
    • Process spawned unexpected child process

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks