General

  • Target

    3a0235b5137c1d8dffa67e97c6dbe13cfc7117e3c62dfee05d8897acdea83b5c

  • Size

    165KB

  • Sample

    210121-pa8cyvjk3a

  • MD5

    7a5e2b6e3f51bcb6fb5822dd20826df0

  • SHA1

    4d0dabc6f017f8cb7e6ea3a44cb2b6d66c387874

  • SHA256

    3a0235b5137c1d8dffa67e97c6dbe13cfc7117e3c62dfee05d8897acdea83b5c

  • SHA512

    fd8452a0d6e910734df4c763f5a6307843fd74218b3dbdf8a9723c9189917e1d55630c28b737263f7ee5a3fe008d0438ab0d07ddcd9b2423b1e21a2b9cf096ff

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://trendmoversdubai.com/cgi-bin/B73/

exe.dropper

http://dryaquelingrdo.com/wp-content/SI/

exe.dropper

http://bardiastore.com/wp-admin/A1283/

exe.dropper

http://oxycode.net/wp-admin/x/

exe.dropper

http://fabulousstylz.net/248152296/TpI/

exe.dropper

http://abdo-alyemeni.com/wp-admin/seG6/

exe.dropper

http://giteslacolombiere.com/wp-admin/FV/

Targets

    • Target

      3a0235b5137c1d8dffa67e97c6dbe13cfc7117e3c62dfee05d8897acdea83b5c

    • Size

      165KB

    • MD5

      7a5e2b6e3f51bcb6fb5822dd20826df0

    • SHA1

      4d0dabc6f017f8cb7e6ea3a44cb2b6d66c387874

    • SHA256

      3a0235b5137c1d8dffa67e97c6dbe13cfc7117e3c62dfee05d8897acdea83b5c

    • SHA512

      fd8452a0d6e910734df4c763f5a6307843fd74218b3dbdf8a9723c9189917e1d55630c28b737263f7ee5a3fe008d0438ab0d07ddcd9b2423b1e21a2b9cf096ff

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks