General

  • Target

    4b0fc81c56dac2f6f2af440333f257bc04a338944fb5ce831dfb9aa19685d94e

  • Size

    157KB

  • Sample

    210113-y7yq3s41x6

  • MD5

    02f8e100bee5f02fd05ef8e781e3ca54

  • SHA1

    3b2d016d9f69230e509f6cb782d946edac9b5275

  • SHA256

    4b0fc81c56dac2f6f2af440333f257bc04a338944fb5ce831dfb9aa19685d94e

  • SHA512

    6c0a778e885450f3fe125bc4f0205256b7d4b1f759c3b73f75a0210eadf517b14221cc876bdec3caa1868df2a3ede7ea8f819a4d1f819b27f023b2282e821fb7

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://altrashift.com/wp-includes/I/

exe.dropper

https://ojodetigremezcal.com/wp/i62s/

exe.dropper

https://snowremoval-services.com/wp-content/P3Z/

exe.dropper

http://kitsunecomplements.com/too-much-phppq/n65U/

exe.dropper

https://imperioone.com/content/WOBq/

exe.dropper

http://www.autoeck-baden.at/wp-content/w0Vb/

exe.dropper

https://shop.animewho.com/content/Tj/

Targets

    • Target

      4b0fc81c56dac2f6f2af440333f257bc04a338944fb5ce831dfb9aa19685d94e

    • Size

      157KB

    • MD5

      02f8e100bee5f02fd05ef8e781e3ca54

    • SHA1

      3b2d016d9f69230e509f6cb782d946edac9b5275

    • SHA256

      4b0fc81c56dac2f6f2af440333f257bc04a338944fb5ce831dfb9aa19685d94e

    • SHA512

      6c0a778e885450f3fe125bc4f0205256b7d4b1f759c3b73f75a0210eadf517b14221cc876bdec3caa1868df2a3ede7ea8f819a4d1f819b27f023b2282e821fb7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks