General

  • Target

    7627eda11db6d5331a7931781d0dc65d79582d05ee0bd74c9a8fe845b2191c64

  • Size

    156KB

  • Sample

    210112-ztlakt9yye

  • MD5

    29a624dada7f21bd5c90c5378e15fa6f

  • SHA1

    8bfe71d33b145a27c32fd08057671778ca5a2b20

  • SHA256

    7627eda11db6d5331a7931781d0dc65d79582d05ee0bd74c9a8fe845b2191c64

  • SHA512

    64853f7ac3e870340e08f42dd64824852c64ccbead53b10b303f8c7636759516131342d1b20c7427b7c333d63880d32d9c3b1287341ed67565ed8b5f4fc6d456

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://remediis.com/t/gm2X/

exe.dropper

http://avadnansahin.com/wp-includes/w/

exe.dropper

http://solicon.us/allam-cycle-1c4gn/f5z/

exe.dropper

http://www.riparazioni-radiotv.com/softaculous/DZz/

exe.dropper

http://www.agricampeggiocortecomotto.it/wp-admin/s7p1/

exe.dropper

https://www.starlingtechs.com/GNM/

exe.dropper

http://hellas-darmstadt.de/cgi-bin/ZSoo/

Targets

    • Target

      7627eda11db6d5331a7931781d0dc65d79582d05ee0bd74c9a8fe845b2191c64

    • Size

      156KB

    • MD5

      29a624dada7f21bd5c90c5378e15fa6f

    • SHA1

      8bfe71d33b145a27c32fd08057671778ca5a2b20

    • SHA256

      7627eda11db6d5331a7931781d0dc65d79582d05ee0bd74c9a8fe845b2191c64

    • SHA512

      64853f7ac3e870340e08f42dd64824852c64ccbead53b10b303f8c7636759516131342d1b20c7427b7c333d63880d32d9c3b1287341ed67565ed8b5f4fc6d456

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks