General

  • Target

    0faa2c2d34917cf03fec0fc62476fd875ece30a6c4fd34492adf5ec5c5122c49

  • Size

    98KB

  • Sample

    220520-12hzlshfhp

  • MD5

    6f70e118d2f76719f959d2f38ecf6aa5

  • SHA1

    6a67c02a7a05ac6ff946f5a84b9dc6a1bf451ab9

  • SHA256

    0faa2c2d34917cf03fec0fc62476fd875ece30a6c4fd34492adf5ec5c5122c49

  • SHA512

    9342fc9ec324ea28712e86403b261050bdb203765f728addae2f5b5180bf3c6baca7a1e9278b4066b236f313badf10f6a3ba677b85c810484421f2d478e31c1b

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      8a4a57846eea8faa5c726d61b5859c19

    • SHA1

      735149f6becbf5b4ffeb91ebdd7699151bffb3cf

    • SHA256

      7749011322a1fa88e88ac29e4663fc961f0b6ca6432e1257aefaceb28252a4c3

    • SHA512

      f3c33220e6b1582a9b9d67b4b45614b659165c06498a12d7427e666368e77b5fc02cadfd42abf535b8b550ef91d2768746f97a29891799492185ae673be0a07f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks