General

  • Target

    e29f14ed1dc3b16a16114912695d69e7a952ca0c51374c59618bfedeac56b43a

  • Size

    22KB

  • Sample

    220201-pwhacafbb7

  • MD5

    a469d5403003584e71c5e5bdbfc5d4e4

  • SHA1

    adf569be634c8bd03cc1948042499545a1bd1996

  • SHA256

    e29f14ed1dc3b16a16114912695d69e7a952ca0c51374c59618bfedeac56b43a

  • SHA512

    fabdb31756703f80cf168ee43f47e1538b43e02e4f9ac648c852aa7da3b87add8aaad1a08865ff2d8f2f1e48d4122fe7faf67453924885badad63df8c2f4c15a

Score
10/10

Malware Config

Targets

    • Target

      e29f14ed1dc3b16a16114912695d69e7a952ca0c51374c59618bfedeac56b43a

    • Size

      22KB

    • MD5

      a469d5403003584e71c5e5bdbfc5d4e4

    • SHA1

      adf569be634c8bd03cc1948042499545a1bd1996

    • SHA256

      e29f14ed1dc3b16a16114912695d69e7a952ca0c51374c59618bfedeac56b43a

    • SHA512

      fabdb31756703f80cf168ee43f47e1538b43e02e4f9ac648c852aa7da3b87add8aaad1a08865ff2d8f2f1e48d4122fe7faf67453924885badad63df8c2f4c15a

    Score
    10/10
    • Nloader

      Simple loader that includes the keyword 'campo' in the URL used to download other families.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Nloader Payload

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v6

Tasks