General

  • Target

    cd26143fd22b6cbf5db4309ecc97366923ad7b8de7ae9870ef31c0700f41a121

  • Size

    157KB

  • Sample

    210112-vw143xrx36

  • MD5

    bff195f2d6491db57936bd802a76db58

  • SHA1

    b62071a41c7f68260ffa116012428b7a274675df

  • SHA256

    cd26143fd22b6cbf5db4309ecc97366923ad7b8de7ae9870ef31c0700f41a121

  • SHA512

    151a9b0c370165a5fb19b24c5084cdfcb570b32b5d3625348728a82c04dad1ed13d8b5329ed0f03026a5c20849214b67f4c0283b69380727bced4b1f6b506275

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://remediis.com/t/gm2X/

exe.dropper

http://avadnansahin.com/wp-includes/w/

exe.dropper

http://solicon.us/allam-cycle-1c4gn/f5z/

exe.dropper

http://www.riparazioni-radiotv.com/softaculous/DZz/

exe.dropper

http://www.agricampeggiocortecomotto.it/wp-admin/s7p1/

exe.dropper

https://www.starlingtechs.com/GNM/

exe.dropper

http://hellas-darmstadt.de/cgi-bin/ZSoo/

Targets

    • Target

      cd26143fd22b6cbf5db4309ecc97366923ad7b8de7ae9870ef31c0700f41a121

    • Size

      157KB

    • MD5

      bff195f2d6491db57936bd802a76db58

    • SHA1

      b62071a41c7f68260ffa116012428b7a274675df

    • SHA256

      cd26143fd22b6cbf5db4309ecc97366923ad7b8de7ae9870ef31c0700f41a121

    • SHA512

      151a9b0c370165a5fb19b24c5084cdfcb570b32b5d3625348728a82c04dad1ed13d8b5329ed0f03026a5c20849214b67f4c0283b69380727bced4b1f6b506275

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks