General

  • Target

    3fce454b_by_Libranalysis

  • Size

    43KB

  • Sample

    210511-m3w14wgcye

  • MD5

    3fce454b5a5ba7d73cc2b2560f69a48a

  • SHA1

    b9321f7d1bbb1e020b03b676bd23d53e9ff6c17e

  • SHA256

    b9c87683d4000e24d419ebe199d2c55dbb9757d5cc8f4e6d9a0295e963cbb07c

  • SHA512

    fc35cb2957f15a3cdadf282c1b6d0f876dd710061d7c645618b83a394171723d24ddfecc64d721cb2cb1745e44a283dcc7278d6da9f3a67465e2cb8e760eb943

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://atlantastunttruckdrivers.com/Denight.exe

Targets

    • Target

      3fce454b_by_Libranalysis

    • Size

      43KB

    • MD5

      3fce454b5a5ba7d73cc2b2560f69a48a

    • SHA1

      b9321f7d1bbb1e020b03b676bd23d53e9ff6c17e

    • SHA256

      b9c87683d4000e24d419ebe199d2c55dbb9757d5cc8f4e6d9a0295e963cbb07c

    • SHA512

      fc35cb2957f15a3cdadf282c1b6d0f876dd710061d7c645618b83a394171723d24ddfecc64d721cb2cb1745e44a283dcc7278d6da9f3a67465e2cb8e760eb943

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks