General

  • Target

    f600525e9280548fe835cab0f2e9787ece76beb23c5406eb2da734d00a17b0d7

  • Size

    156KB

  • Sample

    210112-9r8x9p7ky2

  • MD5

    bfac7ba1841ed2cf28415f1b9bbd853b

  • SHA1

    e27990c15f3cc7b6ffd5ce4bddcd8d074ebe6690

  • SHA256

    f600525e9280548fe835cab0f2e9787ece76beb23c5406eb2da734d00a17b0d7

  • SHA512

    7f2922ad92c11fe8d70777d418480de408bfb1a2f911e46dbc35463ae99a04828c726547f22d7f8d3ff3dccedb60193d4fccfadbbd0dde3e486e95b80adbeb4e

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://remediis.com/t/gm2X/

exe.dropper

http://avadnansahin.com/wp-includes/w/

exe.dropper

http://solicon.us/allam-cycle-1c4gn/f5z/

exe.dropper

http://www.riparazioni-radiotv.com/softaculous/DZz/

exe.dropper

http://www.agricampeggiocortecomotto.it/wp-admin/s7p1/

exe.dropper

https://www.starlingtechs.com/GNM/

exe.dropper

http://hellas-darmstadt.de/cgi-bin/ZSoo/

Targets

    • Target

      f600525e9280548fe835cab0f2e9787ece76beb23c5406eb2da734d00a17b0d7

    • Size

      156KB

    • MD5

      bfac7ba1841ed2cf28415f1b9bbd853b

    • SHA1

      e27990c15f3cc7b6ffd5ce4bddcd8d074ebe6690

    • SHA256

      f600525e9280548fe835cab0f2e9787ece76beb23c5406eb2da734d00a17b0d7

    • SHA512

      7f2922ad92c11fe8d70777d418480de408bfb1a2f911e46dbc35463ae99a04828c726547f22d7f8d3ff3dccedb60193d4fccfadbbd0dde3e486e95b80adbeb4e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks