General

  • Target

    d18ee35b037d473e3ef71c9d7b34e4a758b27a2ac27316621475b6944e5d453c

  • Size

    83KB

  • Sample

    220115-cqtd7sbhh7

  • MD5

    33882b5b26a57a11821b91ada304c96a

  • SHA1

    c8ea99b2460c4d7206ef5a0b5c309d06a6137627

  • SHA256

    d18ee35b037d473e3ef71c9d7b34e4a758b27a2ac27316621475b6944e5d453c

  • SHA512

    9e8ea7aaa6ca92c9dc712884ad8216da6d07cf97801a8f59cff51613a54e30f35cadea60b881b9eccaa0f6c82e35b3b6e07621dbb4d9ba9a1fd1de3dd890db5c

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://recont.com/n8xbqb/lwEORjcJYPKCNQ/

xlm40.dropper

http://dichnghiatienganh.com/jvmqawn/2mdbSTjM1Lg/

xlm40.dropper

https://www.moharrampartners.com/requestion/wiA/

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://recont.com/n8xbqb/lwEORjcJYPKCNQ/

Targets

    • Target

      d18ee35b037d473e3ef71c9d7b34e4a758b27a2ac27316621475b6944e5d453c

    • Size

      83KB

    • MD5

      33882b5b26a57a11821b91ada304c96a

    • SHA1

      c8ea99b2460c4d7206ef5a0b5c309d06a6137627

    • SHA256

      d18ee35b037d473e3ef71c9d7b34e4a758b27a2ac27316621475b6944e5d453c

    • SHA512

      9e8ea7aaa6ca92c9dc712884ad8216da6d07cf97801a8f59cff51613a54e30f35cadea60b881b9eccaa0f6c82e35b3b6e07621dbb4d9ba9a1fd1de3dd890db5c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks