General

  • Target

    0e59cfb3146a35a9e641ac58b93565e1377274358baeaf05415872926d090007

  • Size

    98KB

  • Sample

    220520-12pgdseee2

  • MD5

    a51b05f1da1560d555343a0a2980d10b

  • SHA1

    9fe42460e41607899655150cd3fe46b27b66abf1

  • SHA256

    0e59cfb3146a35a9e641ac58b93565e1377274358baeaf05415872926d090007

  • SHA512

    be5a27c90e0877937e6d5482188db763a64a302a2cd3749dcf4bac606b8c46ac73911c4ec78664859d2b0f69546e981b0a3bf8e54d5e72a8cc3eb613279d947e

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      0dbbff251aba81a1d865fc9159766c65

    • SHA1

      5fb8a73a944403590bcdfff858c1247f0f543924

    • SHA256

      ee5765cc9b118bc6b24079a4701e6ff2d9d91719f9fd11536b6448364b217cb2

    • SHA512

      299f03412b42bb4c939398cea2e67f28f2bb7a8b3add49b2f1698639a8f02a6cfa6068457f172f09d8bfe1212e87a815594c16c2d5eac26a612ad8c18e43d09e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks