General

  • Target

    2361d0e1b933d0146c44874b661d74a11ac6152fc62a3cae8de22c8e0cc38cdb

  • Size

    249KB

  • Sample

    220520-19nvtsehf5

  • MD5

    2065664436cf97b0a80afbd14bc08023

  • SHA1

    986b0c843ddb53b5591994f704d8466f4b36f441

  • SHA256

    2361d0e1b933d0146c44874b661d74a11ac6152fc62a3cae8de22c8e0cc38cdb

  • SHA512

    3c3c37dc80eafb6cae956b54c46d0aaa9e74b55824bc0163210e4511ef9223516afa08f53dd85671c2a45c5fdd419e076362fc175bd2f0e98cd59165e1079148

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://sauloramos.com.br/PLcbM/4oxcev0320/

exe.dropper

http://jurczyk.biz/piotrek/IJilgckESlY/

exe.dropper

http://lidiscom.com.br/BKP_TinaPOS/CQSMl/

exe.dropper

http://cmswrexham.com/video/N2lzhgh45/

exe.dropper

http://lyveinc.com/wp-content/uploads/attachments/XxM/

exe.dropper

https://stateinsuranceonline.com/wp-content/yQzAGwyQs/

exe.dropper

https://www.teringieestatefarms.com.au/wp-content/Lvqg/

Targets

    • Target

      2361d0e1b933d0146c44874b661d74a11ac6152fc62a3cae8de22c8e0cc38cdb

    • Size

      249KB

    • MD5

      2065664436cf97b0a80afbd14bc08023

    • SHA1

      986b0c843ddb53b5591994f704d8466f4b36f441

    • SHA256

      2361d0e1b933d0146c44874b661d74a11ac6152fc62a3cae8de22c8e0cc38cdb

    • SHA512

      3c3c37dc80eafb6cae956b54c46d0aaa9e74b55824bc0163210e4511ef9223516afa08f53dd85671c2a45c5fdd419e076362fc175bd2f0e98cd59165e1079148

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks