General

  • Target

    b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005

  • Size

    109KB

  • Sample

    220201-ez4mmsgehq

  • MD5

    be1f448868949ba25e0b199e1e3139b2

  • SHA1

    87435983272d0ff58ffaf105452e3e6322694ed7

  • SHA256

    b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005

  • SHA512

    2834635393ff61b60a06573df17582740e8f41f6c2eb5bdda685c5d5dd494691f4a34748e9693fff3b5834c133eb969f0ba207b8b13677652f8c1dca9bf81a2d

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://rechholz.de/yYw1qvd/

exe.dropper

http://psd-ga.com/zapgovno/Nhfxs/

exe.dropper

http://gtdesign.ch/oFNj7EV/

exe.dropper

http://startstudio.it/nDFE7y/

Targets

    • Target

      b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005

    • Size

      109KB

    • MD5

      be1f448868949ba25e0b199e1e3139b2

    • SHA1

      87435983272d0ff58ffaf105452e3e6322694ed7

    • SHA256

      b4fdb77c5b6eede55fa1025dcbd522ada24dc6fef82efbeac60934cb6a8e8005

    • SHA512

      2834635393ff61b60a06573df17582740e8f41f6c2eb5bdda685c5d5dd494691f4a34748e9693fff3b5834c133eb969f0ba207b8b13677652f8c1dca9bf81a2d

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Sets service image path in registry

MITRE ATT&CK Enterprise v6

Tasks