General

  • Target

    RGRDJC754N2890.doc

  • Size

    167KB

  • Sample

    210121-jym77zlbz6

  • MD5

    e1f8657cbe0da37d0a97d9f09c808a4d

  • SHA1

    778da08bbfb5c8d7cb4cf30df2fe836d7ecbd323

  • SHA256

    63e309a34a45ce8531b8e6eb42b8a4708be04438e603f6e13004116075454139

  • SHA512

    a05cc134b1859603b9adcec7e731a5d49394cf6129603435d2e5a6bb48483fd82a24f18c8d098a3f9c8da493ef64813699f985d9078e48dafde0d30a4221ec99

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://trainwithconviction.com/wp-admin/y/

exe.dropper

http://trainwithconviction.webdmcsolutions.com/wp-admin/rEEEU/

exe.dropper

https://perrasmoore.ca/wp-admin/rM6HK/

exe.dropper

https://canadabrightway.com/wp-admin/n3/

exe.dropper

https://upinsmokebatonrouge.com/var/Ux1V/

exe.dropper

https://thelambertagency.com/staging/Vo/

exe.dropper

https://stormhansen.com/2556460492/if/

Targets

    • Target

      RGRDJC754N2890.doc

    • Size

      167KB

    • MD5

      e1f8657cbe0da37d0a97d9f09c808a4d

    • SHA1

      778da08bbfb5c8d7cb4cf30df2fe836d7ecbd323

    • SHA256

      63e309a34a45ce8531b8e6eb42b8a4708be04438e603f6e13004116075454139

    • SHA512

      a05cc134b1859603b9adcec7e731a5d49394cf6129603435d2e5a6bb48483fd82a24f18c8d098a3f9c8da493ef64813699f985d9078e48dafde0d30a4221ec99

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Drops file in System32 directory

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Enterprise v6

Tasks