General

  • Target

    7e3594e72aafcfce1881cd18944a47a2be2e2138cd2302d3b427f0b7aad609eb

  • Size

    98KB

  • Sample

    220520-1gkygahagn

  • MD5

    90b6b34d4c553078144f590edee5881d

  • SHA1

    05cac0084bd34a0fc0b35405ad94b7df5514a1f1

  • SHA256

    7e3594e72aafcfce1881cd18944a47a2be2e2138cd2302d3b427f0b7aad609eb

  • SHA512

    6b8d15d892dca1f477b77f7f323dbb41cdf4a367c6e65d5d18e2254e4a88049f2bad459f6b8eca340e021c4f08f667d67a0b80cbc04a974308292ea9cd144bbb

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      e1daf1a86ed0572a4e6239baa91f5cb0

    • SHA1

      5d74ad8d473967f5e4355778f04f4105f90f6999

    • SHA256

      fcc0bbc42e2e7c52087a0a4da5dff8a2ed8efddd80d6a4805aa9fccfbfdd3910

    • SHA512

      79477afe9054ef69f6c22171e972cb59e912bc583e457be86fed62a9d0697a7cb6eed07c0ade2a1f3345f44bc83e3bde706fa01c585a8570ae2f752b058aa0e4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks