General

  • Target

    9a183ea7ab2cff6214148463b0ca540be3a0a3ce0fd187ddbb88bbc42e674cc0

  • Size

    98KB

  • Sample

    220520-1bxp3sdga8

  • MD5

    d6631e530281876eb4977460ec606974

  • SHA1

    ebe3d36af21b65c115dfa88073656691d0b7ac94

  • SHA256

    9a183ea7ab2cff6214148463b0ca540be3a0a3ce0fd187ddbb88bbc42e674cc0

  • SHA512

    967cf80bf85e66f894b1efd89c2099d932b91a23baa829cd05c32204da1aa0de8fa538bf7b0678c8287eb34faa59c99421e3a71df7cf195f0b5898f0eea0e688

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      168KB

    • MD5

      8fa56e0d7beaaf857a171ba0f7b27b13

    • SHA1

      94a535c4337bcc7f8e2badd49aa4bb829ac5f39e

    • SHA256

      1ec0aea3e7613086f550e01f5014835b55ac12b7d35ad781c2173dd150a0eeba

    • SHA512

      79a6cbcc57ab7a54b28f8ff86b2ccc35f1e70d6f56ceaeceb662bccecaabaa092d29056be26ac7f8f466a7600d126410f498635a6222d50724d05ce71d20f895

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks