General

  • Target

    dba7a4b42e291b9f9fa4c9734d6671a1ebb6dda6e2bec200a0d72322ad1f37b6

  • Size

    64KB

  • Sample

    220330-azt1zsddf9

  • MD5

    3be2fb0ec4047d062355d296b9542af6

  • SHA1

    52a491bb8fa13f3b38b13c5466e553c1f80d8373

  • SHA256

    77ca083798771d05b2c03d5386ac060c1797d8bc74f259558f28654f45393886

  • SHA512

    a121b86177219d77e67bdc766b2fe66f9ccf484848ec6a25daa80cc29a5e771af8d684ded86e95e37f6921c2777c870298b81c7c4943b498eacb807e87398cec

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://fccatinsaat.com/wp-content/Cw3aR6792f/

xlm40.dropper

http://fabulouswebdesign.net/invoice/m/

xlm40.dropper

http://freemanylaluz.com/downloads/8dR9pgNBFtz/

xlm40.dropper

https://freewebsitedirectory.com/wp-includes/v2qFAlMZELRkxbz/

Targets

    • Target

      dba7a4b42e291b9f9fa4c9734d6671a1ebb6dda6e2bec200a0d72322ad1f37b6

    • Size

      106KB

    • MD5

      15607491b1fae48c53117a513dd5b413

    • SHA1

      604b48c6e84d1aa1c10cfa97d80c07be3ce1b99b

    • SHA256

      dba7a4b42e291b9f9fa4c9734d6671a1ebb6dda6e2bec200a0d72322ad1f37b6

    • SHA512

      045fd7a802605e5408b12b31b4a991088ce40f649cb2c717f7b55f10102de0917ffa3876383b73a7b1f14d2f98505c5e0fd981e14626b1939b0f9b9aee19b8f0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks