General

  • Target

    a49399789b01cd98a86c1e039af45a87a2c9ec07d14956bb189152912239bc4c

  • Size

    83KB

  • Sample

    220114-ejj83aebc5

  • MD5

    11754de7790b7597ab40d15a942dd0ee

  • SHA1

    c2bdc2086bead5dcaae04d46937171cb0c9a9076

  • SHA256

    a49399789b01cd98a86c1e039af45a87a2c9ec07d14956bb189152912239bc4c

  • SHA512

    d7918d2e4ca28af4d0fdcbc29bd1f2cddfcca829e4f85da4bff3210bccecd55e7e411f4b99699d7db8b0349bec51af62b7f936471cbe427d1908aa95cdf9f834

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://shopnhap.com/highbinder/UedVfTHDf5Em40/

xlm40.dropper

https://celhocortofilmfestival.stream/css/Naq/

xlm40.dropper

https://astrologersandeepbhargav.com/wp-admin/FRwR9VH/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://shopnhap.com/highbinder/UedVfTHDf5Em40/

Targets

    • Target

      a49399789b01cd98a86c1e039af45a87a2c9ec07d14956bb189152912239bc4c

    • Size

      83KB

    • MD5

      11754de7790b7597ab40d15a942dd0ee

    • SHA1

      c2bdc2086bead5dcaae04d46937171cb0c9a9076

    • SHA256

      a49399789b01cd98a86c1e039af45a87a2c9ec07d14956bb189152912239bc4c

    • SHA512

      d7918d2e4ca28af4d0fdcbc29bd1f2cddfcca829e4f85da4bff3210bccecd55e7e411f4b99699d7db8b0349bec51af62b7f936471cbe427d1908aa95cdf9f834

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks