General

  • Target

    index.ps1

  • Size

    1.3MB

  • Sample

    220211-s3jcrsedel

  • MD5

    d57fbade6e2181198807bbc31b115e3a

  • SHA1

    2c3a54dfb9d23cadacd17d707e911a021b4e53ef

  • SHA256

    63203d5fa490ac4467049929bfce158a940cf325c09231c0db88a836ddb3ffd5

  • SHA512

    a063042a68f7c17e4e3afbeb0a707b497fc2779e2644a2d7fb9d850469a7be086e1a29325cf725ce4c1536eedcbe7e4790ca015020f0903925952fcfab95fd1a

Score
10/10

Malware Config

Extracted

Family

nworm

Version

v0.3.8

C2

nyanmoj.duckdns.org:5057

moneyhope81.duckdns.org:5057

Mutex

cb2d3cba

Targets

    • Target

      index.ps1

    • Size

      1.3MB

    • MD5

      d57fbade6e2181198807bbc31b115e3a

    • SHA1

      2c3a54dfb9d23cadacd17d707e911a021b4e53ef

    • SHA256

      63203d5fa490ac4467049929bfce158a940cf325c09231c0db88a836ddb3ffd5

    • SHA512

      a063042a68f7c17e4e3afbeb0a707b497fc2779e2644a2d7fb9d850469a7be086e1a29325cf725ce4c1536eedcbe7e4790ca015020f0903925952fcfab95fd1a

    Score
    10/10
    • NWorm

      A TrickBot module used to propagate to vulnerable domain controllers.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks