General

  • Target

    26261f6683880339a902fbe83bf577ff5656ba5e8b1b274c694a8a2f31a83346

  • Size

    83KB

  • Sample

    220115-bwazdabge3

  • MD5

    f9012d9418b433820f28296b327f19c8

  • SHA1

    1e71ded4267684b861ddd3aebc1e3839ff177058

  • SHA256

    26261f6683880339a902fbe83bf577ff5656ba5e8b1b274c694a8a2f31a83346

  • SHA512

    62be71d64b3eaf6921449087418814c598661626081e2af0b75f92dc0fa845cb1853aa4c4ab5e727257292ad1043fd6fa2e3a0545daac8beedd2ff9ca5fd5e48

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.crownpacificpartners.com/guglio/Rt4el/

xlm40.dropper

http://nbp-c.com/ya/O0BO5vb3z1MkWcDOqV2/

xlm40.dropper

http://rjmtel.com/wp-content/bYAiTvGo635qKITG6/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://www.crownpacificpartners.com/guglio/Rt4el/

Targets

    • Target

      26261f6683880339a902fbe83bf577ff5656ba5e8b1b274c694a8a2f31a83346

    • Size

      83KB

    • MD5

      f9012d9418b433820f28296b327f19c8

    • SHA1

      1e71ded4267684b861ddd3aebc1e3839ff177058

    • SHA256

      26261f6683880339a902fbe83bf577ff5656ba5e8b1b274c694a8a2f31a83346

    • SHA512

      62be71d64b3eaf6921449087418814c598661626081e2af0b75f92dc0fa845cb1853aa4c4ab5e727257292ad1043fd6fa2e3a0545daac8beedd2ff9ca5fd5e48

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks