General

  • Target

    ARC_H535.doc

  • Size

    167KB

  • Sample

    210114-nyj71lzsrn

  • MD5

    265eac00afa62c7e92da8988d51ae7da

  • SHA1

    2d341415c447553e9deb2a594b0ec988293c8313

  • SHA256

    5eb02656c9d0f774760331a9af55e93a774b09ceaf654a1f199ab800c8a00c50

  • SHA512

    96725f1869b1b2643a319211401cb5fca9b27af39bc22bc81d5b578482c0dc42376e974f36da8d1399e347cb83e8c7329453ce889ea4e12f8fecf08a49d09ed1

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://transfersuvan.com/wp-admin/yhUw0GU/

exe.dropper

http://equipamentosmix.com/1/TRM/

exe.dropper

http://vedavacademy.com/wp-admin/7BHbH/

exe.dropper

http://lezz-etci.com/wp-content/mXxP/

exe.dropper

https://lapiramideopticas.com/tesla-powerwall-ok3h2/kmJ/

exe.dropper

http://aryasamajmandirkanpur.com/cgi-bin/VcJK/

exe.dropper

http://music.mnahid.com/wp-admin/kCGrt8/

Targets

    • Target

      ARC_H535.doc

    • Size

      167KB

    • MD5

      265eac00afa62c7e92da8988d51ae7da

    • SHA1

      2d341415c447553e9deb2a594b0ec988293c8313

    • SHA256

      5eb02656c9d0f774760331a9af55e93a774b09ceaf654a1f199ab800c8a00c50

    • SHA512

      96725f1869b1b2643a319211401cb5fca9b27af39bc22bc81d5b578482c0dc42376e974f36da8d1399e347cb83e8c7329453ce889ea4e12f8fecf08a49d09ed1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks