General

  • Target

    e1f0eb778a09fec529aa7aff9d665828b18007c8e52d62565a552f606c04442f

  • Size

    83KB

  • Sample

    220114-qgc8hsgch2

  • MD5

    a9aea9d70fa64583449e1719825a5f0d

  • SHA1

    84f0ef7106464cedb4f1d4665f5c64897ba087e6

  • SHA256

    e1f0eb778a09fec529aa7aff9d665828b18007c8e52d62565a552f606c04442f

  • SHA512

    f65dfbaa0d55e0402f4cb02795b1d9e7ef7c539832e90127f518e28bfbbb3f53a54aff6d2d8f883235b45250af0ef7afcfa1cc086a01380d23936f636994752a

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://badmakeup.biz/dhl/3ez4GMS65Gk6Bgxd/

xlm40.dropper

http://91xxxooo.com/get/hRG6d/

xlm40.dropper

http://hordlepc.com/rootF0x-uyxab/YW8UUhCWN/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://badmakeup.biz/dhl/3ez4GMS65Gk6Bgxd/

Targets

    • Target

      e1f0eb778a09fec529aa7aff9d665828b18007c8e52d62565a552f606c04442f

    • Size

      83KB

    • MD5

      a9aea9d70fa64583449e1719825a5f0d

    • SHA1

      84f0ef7106464cedb4f1d4665f5c64897ba087e6

    • SHA256

      e1f0eb778a09fec529aa7aff9d665828b18007c8e52d62565a552f606c04442f

    • SHA512

      f65dfbaa0d55e0402f4cb02795b1d9e7ef7c539832e90127f518e28bfbbb3f53a54aff6d2d8f883235b45250af0ef7afcfa1cc086a01380d23936f636994752a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks