General

  • Target

    0296a26e1245a0fb567e01ac60f0de8b6bb2b7baefa06f246b47b4bca78058c9

  • Size

    98KB

  • Sample

    220520-14hrmaefa6

  • MD5

    eb54450847e05f350568ea256b6e936d

  • SHA1

    38f5def87a4ed752e33acc9304ae0781d133382f

  • SHA256

    0296a26e1245a0fb567e01ac60f0de8b6bb2b7baefa06f246b47b4bca78058c9

  • SHA512

    38ed4aa6d0428cc1717adb2728a1fca305bf7be106f52c145b2e02ae6d36d3afc75cbcd26d8f9bd8e87a1fc57a0e05a90f4eb213c96f9323592ebd74d76b1322

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      408c1106ba8fdc3b76918eae19deaa5c

    • SHA1

      3a4fcfba0d27cc5e6d57881bdb246cae7313cb65

    • SHA256

      2ef95fd9c222a0b299b53659e79526a1281e9d076b75aafaedb447034237ba36

    • SHA512

      5dbf0e4321ba384d004d33c107043274c73dbbfd70e26cd41ca99ea40b5393c529a5233cba5505040c5146339cb47f1ef366608c7a3a2de0fb91af557f1ea485

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks