General

  • Target

    b80739d7b435e5a620e5c121269e1f8a2050a87d1a4d6b934107346c62d09ddc

  • Size

    157KB

  • Sample

    210113-dbk897lvcx

  • MD5

    10eb8fa1a6ba17505b6a14cc63aaa13f

  • SHA1

    1207a59c562a2692db0d8d723d6660c468c5cadd

  • SHA256

    b80739d7b435e5a620e5c121269e1f8a2050a87d1a4d6b934107346c62d09ddc

  • SHA512

    07eaa1a76c58cc521661dd18fb518c88df8bab0d00b9b2807b2a4604df3951ed31b1de828aa09c726146e4c8aba4f5709b86190bffa49bc8c10097ab1720cf2f

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://altrashift.com/wp-includes/I/

exe.dropper

https://ojodetigremezcal.com/wp/i62s/

exe.dropper

https://snowremoval-services.com/wp-content/P3Z/

exe.dropper

http://kitsunecomplements.com/too-much-phppq/n65U/

exe.dropper

https://imperioone.com/content/WOBq/

exe.dropper

http://www.autoeck-baden.at/wp-content/w0Vb/

exe.dropper

https://shop.animewho.com/content/Tj/

Targets

    • Target

      b80739d7b435e5a620e5c121269e1f8a2050a87d1a4d6b934107346c62d09ddc

    • Size

      157KB

    • MD5

      10eb8fa1a6ba17505b6a14cc63aaa13f

    • SHA1

      1207a59c562a2692db0d8d723d6660c468c5cadd

    • SHA256

      b80739d7b435e5a620e5c121269e1f8a2050a87d1a4d6b934107346c62d09ddc

    • SHA512

      07eaa1a76c58cc521661dd18fb518c88df8bab0d00b9b2807b2a4604df3951ed31b1de828aa09c726146e4c8aba4f5709b86190bffa49bc8c10097ab1720cf2f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks