General

  • Target

    7265e9cb793ecf5b81bfc2490246c6b5786b46ec8712658fc372dd766820bd79

  • Size

    98KB

  • Sample

    220520-1jbgtahbcj

  • MD5

    20c938a6cb9b61bdfd59cc161ad740c8

  • SHA1

    69033cd15754448fe777fe0b4f3be505e20b1f79

  • SHA256

    7265e9cb793ecf5b81bfc2490246c6b5786b46ec8712658fc372dd766820bd79

  • SHA512

    a113ed67ec8b46cce07e87e47016418cc1b64c68e6b41d96ca4d8c898fff6c47dbbab55d7af93d3da97f7caa376f11132806c9eaaaa157014a0ccff391225e4b

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      68c5696712995f9965ceceb97984a41b

    • SHA1

      1ceb894d78cb21e8619fd42f21c6e6960cb9ed86

    • SHA256

      f1c56fe29cd7e0ea2967af2786c10bb6830fed226a6920d8905396bb8fd4e2d4

    • SHA512

      cedfbfb7278e62b73c660657f3ee33c7ce1b0aa7acb0e8b138527c95cd75ef2d84d920f993c9a940ff48704b79576491cb0794418f5e09ce9f2be477bc7d32a1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks