General

  • Target

    VHMediaCOM.exe

  • Size

    4.2MB

  • Sample

    220211-f4wy2achdl

  • MD5

    bc5bd30af7d1d4d7bcd6be010ece75d6

  • SHA1

    8e91ed348dd5d09953386839ad5b5fd5f70d6220

  • SHA256

    d063e864ffe2ac8b6853c241625c0b4c1d892aa8639c2f942a35e15d895df988

  • SHA512

    9d2892feb96853cb74770564b2f3c0365604d9b255b6a9cc23089092a98b7e96d8f80195e47aedc00308c980af5d8352d5fa46de701f0a54da92441712aa4ebb

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://86.105.252.194/JlAvGw13CF.php

Targets

    • Target

      VHMediaCOM.exe

    • Size

      4.2MB

    • MD5

      bc5bd30af7d1d4d7bcd6be010ece75d6

    • SHA1

      8e91ed348dd5d09953386839ad5b5fd5f70d6220

    • SHA256

      d063e864ffe2ac8b6853c241625c0b4c1d892aa8639c2f942a35e15d895df988

    • SHA512

      9d2892feb96853cb74770564b2f3c0365604d9b255b6a9cc23089092a98b7e96d8f80195e47aedc00308c980af5d8352d5fa46de701f0a54da92441712aa4ebb

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks