General

  • Target

    1fa18e851ad74226caf71eaca19ccba3ba2b1457521c4a4fbe6ba07fb3008333

  • Size

    165KB

  • Sample

    210122-aws1g47c16

  • MD5

    d9cb2f4ab4be7907747101122ea4f62f

  • SHA1

    af8b96faa1516b995eabcb2a2e649b0be90ce305

  • SHA256

    1fa18e851ad74226caf71eaca19ccba3ba2b1457521c4a4fbe6ba07fb3008333

  • SHA512

    4794582c9e9ea0c3ec49cac85d12dfafce4f23c0053ea83f1758af58a17a2b0f42add55b52d82da733db17136bfa70702343e5cdc78fe6c83afaf1d82e0e0d34

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://trendmoversdubai.com/cgi-bin/B73/

exe.dropper

http://dryaquelingrdo.com/wp-content/SI/

exe.dropper

http://bardiastore.com/wp-admin/A1283/

exe.dropper

http://oxycode.net/wp-admin/x/

exe.dropper

http://fabulousstylz.net/248152296/TpI/

exe.dropper

http://abdo-alyemeni.com/wp-admin/seG6/

exe.dropper

http://giteslacolombiere.com/wp-admin/FV/

Targets

    • Target

      1fa18e851ad74226caf71eaca19ccba3ba2b1457521c4a4fbe6ba07fb3008333

    • Size

      165KB

    • MD5

      d9cb2f4ab4be7907747101122ea4f62f

    • SHA1

      af8b96faa1516b995eabcb2a2e649b0be90ce305

    • SHA256

      1fa18e851ad74226caf71eaca19ccba3ba2b1457521c4a4fbe6ba07fb3008333

    • SHA512

      4794582c9e9ea0c3ec49cac85d12dfafce4f23c0053ea83f1758af58a17a2b0f42add55b52d82da733db17136bfa70702343e5cdc78fe6c83afaf1d82e0e0d34

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks