General

  • Target

    50573a847fecb9cb0076190b69ecf3bd5c742601b186f3527ec0093de291e121

  • Size

    98KB

  • Sample

    220520-1plvqsebd7

  • MD5

    dfbab8881ddc18b9afb6e6af872baadd

  • SHA1

    3aa0ea14449b47414d34cb26486320edc70136c9

  • SHA256

    50573a847fecb9cb0076190b69ecf3bd5c742601b186f3527ec0093de291e121

  • SHA512

    da6671449d77767c8bf4178a4aedcd4dc863cd1733cfc491272cba877cc0d85d0e3c386040361212ac9066afbaad6314b749633393df78d1d05a508e8e9fc20f

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      4ac005a2b7188c65237b5af50efdac89

    • SHA1

      4c1a29aa8f80b81e8ecbb85df17d069ee2183d7c

    • SHA256

      eef845456d272cc56be852f578b2a6f86b8763235174a5558477d4be45f4c088

    • SHA512

      d41b19bfd7480ea79e12a578472c39171e76c1be6fd2099abeabf5cff4d56e819a151c1386fbd3f9eafb2e4272979f489caaa233cd6c0039f21b3632e5c9607e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks