General

  • Target

    8e04c42475bc3540925710dd1c71fad658b7cb19b6b2206fb59d0fea9b37cd2a

  • Size

    78KB

  • Sample

    201108-r3pdgfhfne

  • MD5

    77fa28e31ec25d1d8d1e639018d9b52f

  • SHA1

    a7d364424df2b19000b76dadd0856fe107ed9f80

  • SHA256

    8e04c42475bc3540925710dd1c71fad658b7cb19b6b2206fb59d0fea9b37cd2a

  • SHA512

    445574d75edc96c67fe10b4c0ee12c6867015793d7b1672577ace4ada0717715d5aa66fe4fe14e7c32a5c355baf065e4e62a829cf6ed767b0454f8c02f434f74

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://artwellness.net/QD1Rti

exe.dropper

http://arkanddove.com/t

exe.dropper

http://ingridkaslik.com/M355AhF

exe.dropper

http://softwarelibre.unipamplona.edu.co/limesurvey/upload/vJa

exe.dropper

http://rmubp.chphmu.de/4bP6ssQ4

Targets

    • Target

      8e04c42475bc3540925710dd1c71fad658b7cb19b6b2206fb59d0fea9b37cd2a

    • Size

      78KB

    • MD5

      77fa28e31ec25d1d8d1e639018d9b52f

    • SHA1

      a7d364424df2b19000b76dadd0856fe107ed9f80

    • SHA256

      8e04c42475bc3540925710dd1c71fad658b7cb19b6b2206fb59d0fea9b37cd2a

    • SHA512

      445574d75edc96c67fe10b4c0ee12c6867015793d7b1672577ace4ada0717715d5aa66fe4fe14e7c32a5c355baf065e4e62a829cf6ed767b0454f8c02f434f74

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks