General

  • Target

    dati 1301 012021.doc

  • Size

    160KB

  • Sample

    210113-5gtbtplesa

  • MD5

    50667a6f18771fa2457d7aac148e5c39

  • SHA1

    b1b865dfdcd99bfd1c9a13420e3da0c43dadcd71

  • SHA256

    2cfe2dfff6ceecc5b57f1f3585b9aa4ba0bb2724bdc3a142519494e36f2f7cf7

  • SHA512

    f339b88c21c4c809cbb85f677b1a7a1a3fafce4e30d8061b3bdeaae21c9985b51afe96c7ae034110bca9b4d42a7771422d2fb7b17aaf2cd5806655df9228c638

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://fynart.com/wp-admin/aNuMy/

exe.dropper

http://dermedicoclinic.com/js/NElI8ZC/

exe.dropper

http://geolifesciences.com/font/r/

exe.dropper

http://rollinghood.com/how-to-ifwed/buj6VQx/

exe.dropper

http://jardindhelena.com/wp-content/u20/

exe.dropper

http://kingshowworldshoppingmall.com/cgi-bin/Ga/

exe.dropper

http://davinciworldshoppingmall.com/cgi-bin/Eh/

Targets

    • Target

      dati 1301 012021.doc

    • Size

      160KB

    • MD5

      50667a6f18771fa2457d7aac148e5c39

    • SHA1

      b1b865dfdcd99bfd1c9a13420e3da0c43dadcd71

    • SHA256

      2cfe2dfff6ceecc5b57f1f3585b9aa4ba0bb2724bdc3a142519494e36f2f7cf7

    • SHA512

      f339b88c21c4c809cbb85f677b1a7a1a3fafce4e30d8061b3bdeaae21c9985b51afe96c7ae034110bca9b4d42a7771422d2fb7b17aaf2cd5806655df9228c638

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks