General

  • Target

    Invoice.zip

  • Size

    60KB

  • Sample

    210112-dgfvf62s3n

  • MD5

    67a63dde3e3faeeb1d6b9a7129ad6582

  • SHA1

    c31c94210b592306e509524b99d8e941ed1e8f03

  • SHA256

    2bbdba2a162f80a58753603aa84c91e14104ae35801cc50719c683c2336ca7d5

  • SHA512

    4b9500fc05d1a8e1196e06a889f445410f716b405240ffeff75a216e615d6892a955da77fa54b8027b52ff0f96d4729221718e6a5949296ced9e05999e35e05a

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://angel2gether.de/BlutEngel/SpeechEngines/

exe.dropper

http://holonchile.cl/cgi-bin/System32/

exe.dropper

http://members.nlbformula.com/cgi-bin/Microsoft.NET/

exe.dropper

http://akybron.hu/wordpress/Triedit/

exe.dropper

https://norailya.com/drupal/4zKMm/

exe.dropper

http://giannaspsychicstudio.com/cgi-bin/Systems/

Targets

    • Target

      Invoice.doc

    • Size

      104KB

    • MD5

      30ba4d1ef25df11900d25555ed1afe92

    • SHA1

      47f747a0168edc7c1750cbdfebed933dd3800e40

    • SHA256

      6da352775ced73dd49b4344432f09042fdb661cb4fec4d6253702fb0ed72c8b1

    • SHA512

      bd6f61ed4f19cb977811768103b65716ad4bf8e8fc81cff62c1f4347ab1d66ef79d206f27b5e10a05986e3260f3f1ebeb62a1fefaa02d511353c395a15dc2894

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks