General

  • Target

    a2b6b27d1c8d1305a2c1b8d86fa5d369f96fe4984082dbbaecb4dec9b953da33

  • Size

    98KB

  • Sample

    220520-1az4tadfg8

  • MD5

    29e910322bf0a4dd396433c630554d94

  • SHA1

    61d1c5c3ca091b54ad825bcacfc13c8d2a9aff63

  • SHA256

    a2b6b27d1c8d1305a2c1b8d86fa5d369f96fe4984082dbbaecb4dec9b953da33

  • SHA512

    4d06ebb795461dc6807f1fdf35d1c92b9e894ca4f0fae42a9534527a9c195ed9fcefee1d9c0a5497677d8d883dda647165dd99b4980bf3256aea7ee044b77470

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      168KB

    • MD5

      cd4a2bd8e3d2e65d51756f5df553a447

    • SHA1

      d19b580b11a75b8a282c56eb877550e01f25eebb

    • SHA256

      a0106e59dd260be14700f439f7a350fc5c02d1c3f1eea2c3da779ea8edbdee42

    • SHA512

      ebb451d6e123017a67ba5d03a54224b530f19467289d9c4ae0597bbef392cdb8b90ef94ade377cfc26823fe956dda8247993da9611bea477b545d09e621cd3a9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks