General

  • Target

    a0331e7c78cf8094e5b58707259a8cf46ed4922040109f73dc42dabee9ea4373

  • Size

    98KB

  • Sample

    220520-1a9m9aghbq

  • MD5

    fd17ff90ef44c58e56a97bef34305db8

  • SHA1

    9e776f032aa402cdf5e19483377801c2e02ede14

  • SHA256

    a0331e7c78cf8094e5b58707259a8cf46ed4922040109f73dc42dabee9ea4373

  • SHA512

    ea0097911bd9a2c2289a1456c9ddeeb3c7ef32675c243d898f41a727b2e01f103e102667414b7c08e15dfb1fecebf97beb02360371bf923cdebb27639a2021e6

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      3e988040135078b734779e054e478187

    • SHA1

      3ca65d6350a03b502cc2b2dfcce30b623e9543e8

    • SHA256

      30fcc5f2374d48761f6da68dacfcc248ba3f1326be782d14dba7770908ca7957

    • SHA512

      0daa46a769b70569ad3cbe2c3c2636840853d03535200d242bf5d4778a7d432a6ce0f8fdede73dd96e95a5a074cd7beea559d31b491fcfb2b8d8694a188714dd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks