General

  • Target

    5be9cd898ca39fadca5eff334bc074e68522978bbbfb079a529a211b8b2fe6bd

  • Size

    98KB

  • Sample

    220520-1mjbtseag4

  • MD5

    8fbbb4aaa3aedf4cd3be162f100e4dce

  • SHA1

    d3da332109a20b22cf8a1d2db941fd6e96a6f469

  • SHA256

    5be9cd898ca39fadca5eff334bc074e68522978bbbfb079a529a211b8b2fe6bd

  • SHA512

    76a1e38b828e88bab1a3c35faff3e80e31f68acc5955bd69aafea8b265b8666bb91112067c31794a35d14def881493ece5a8f8b5a689ec1525700f9a98cc338a

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      168KB

    • MD5

      263d8c814d1382617e93f75ffc7295b8

    • SHA1

      4a14fe6cceea05be724f7b9ef8db8a12d20777dd

    • SHA256

      58088a9fda3119b215f1635d1dd1f036ee4788de1ae879597e78e7f3122b4b43

    • SHA512

      700b9836fc954903943fdce42ece988d24fc0b125b38e801b002399720be15dff8b455202754976c32dc779c5251d4172d2c767296da7a457bbc5aed92b85669

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks