General

  • Target

    c07e7c1287b6d764b6b00f6c7ce4fdf8f2d5152a12ff5c37c1d2f82ffe96a209.doc

  • Size

    152KB

  • Sample

    200127-np1n4m5eej

  • MD5

    04c23bbb316dc95143c0ad68a235076c

  • SHA1

    6cedd211b00d62215ebff8809dff7673f49ad06c

  • SHA256

    c07e7c1287b6d764b6b00f6c7ce4fdf8f2d5152a12ff5c37c1d2f82ffe96a209

  • SHA512

    f6d3c7e018a2195679e90ecb539082acc005893f2688b2a1df6eab57e15e83286dfb8a77fe643d58cb6696e51d77ffb0e777bf5d295b1b382275000ff8257a9e

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://yochina.apps.zeroek.com/assets/GQK9Gly/

exe.dropper

http://www.bandarwinsbobet.com/wp-admin/7bw/

exe.dropper

http://test.pakspaservices.com/wp-content/Yi1j6O7/

exe.dropper

http://portal.meucompromisso.com/wp-admin/kQJ/

exe.dropper

https://wondersofgeorgia.com/wp-admin/jv7hvg/

Targets

    • Target

      c07e7c1287b6d764b6b00f6c7ce4fdf8f2d5152a12ff5c37c1d2f82ffe96a209.doc

    • Size

      152KB

    • MD5

      04c23bbb316dc95143c0ad68a235076c

    • SHA1

      6cedd211b00d62215ebff8809dff7673f49ad06c

    • SHA256

      c07e7c1287b6d764b6b00f6c7ce4fdf8f2d5152a12ff5c37c1d2f82ffe96a209

    • SHA512

      f6d3c7e018a2195679e90ecb539082acc005893f2688b2a1df6eab57e15e83286dfb8a77fe643d58cb6696e51d77ffb0e777bf5d295b1b382275000ff8257a9e

    Score
    10/10
    • Process spawned unexpected child process

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks