General

  • Target

    69cfdca448414b6ae4e0746f5edf803572ad0dce9d81bc4dc7df9cae2305715a

  • Size

    98KB

  • Sample

    220520-1klzyaeac4

  • MD5

    4ddf3bcc77437efe7be8a56665fd6195

  • SHA1

    69bbdad716b0b26d07523a81c095b04fdfda8bd0

  • SHA256

    69cfdca448414b6ae4e0746f5edf803572ad0dce9d81bc4dc7df9cae2305715a

  • SHA512

    33af4fde185240ba44f764cb681ab214f7fd48f0dd4814c85e82949e3fcac686f0ff04716fe5b1b8ef9698d74fe9290196a17e7cd62b52180b5e68a0d298500b

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      cb581513103e5be1ce9a5dbe3201703f

    • SHA1

      f24cb3961edc82974e76ea1fe33a2418add46443

    • SHA256

      a671e2959966d9a945046df0dd4a878fbe99b378e108e50c8de5a2746ce7dde8

    • SHA512

      aa12be691726339ad2dc1d68a42b3e6769be9cb1178a71844b4f4b7e9403ffddc87ae3429eda6945a76fe4b6cc4f86e7082668dfea038c70b8b850708f5529f4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks