General

  • Target

    7c7be6cd37f2590fd81701d4c2e98e5c972c166e6378993d443373f920001f0a

  • Size

    98KB

  • Sample

    220520-1gt65shahm

  • MD5

    1f68bb3d5590282b1ceafd6714fe4825

  • SHA1

    805a51ea487dfa69298df87f46fd461a9b585c5e

  • SHA256

    7c7be6cd37f2590fd81701d4c2e98e5c972c166e6378993d443373f920001f0a

  • SHA512

    b5a0f091a83d921fd33c28095ceb325a2322de350c69e7f078069a1c51e1af7f06281b7a19da389be727b7f038726c1ddbfaa8b710442ae90efe8e21dbdbb9ac

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      885b754258cab242b8a1bf6cc602e77d

    • SHA1

      3fda24e3241fadb9934f064af5eb120f39a75c2a

    • SHA256

      ce5d6aa5b1cfe76e48ec485669e784f6e6fa115c5c008cd89c499726b2a74652

    • SHA512

      b60c447cf88cc8022b18024dba768b839a6f0dffc2872cb497e92d3825945f6bfe7f5995beb9bccf04350e996b4613f575f8794f7db328095125e58c86504dad

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks