General

  • Target

    503a5749d5396379e45e61d1b8b5c84a81ae0013a83e92e8fdec37bfbfbee1eb

  • Size

    98KB

  • Sample

    220520-1pplmaebd8

  • MD5

    263c889fdd00d78d173b4adc1585e1db

  • SHA1

    183754fd1b2156ff678cb96d2ab3974beb09b0c9

  • SHA256

    503a5749d5396379e45e61d1b8b5c84a81ae0013a83e92e8fdec37bfbfbee1eb

  • SHA512

    cdc18e5dfaaea5941219a1315266a20a2a872a5b5056e8405525e432d28eadda3095b24d8344a1b7fd6723f38567d95f83620c96c6fe49d32d891d29b54ea436

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      168KB

    • MD5

      ecd85419efff822cf419aef56adcbbaf

    • SHA1

      a59831405a4397d19186774a8833c2dfa6d1b233

    • SHA256

      f21e6c6dd73f1a99d913d80b3465c4aa3df89467e4a9711cda9de6b9f3c310bb

    • SHA512

      6f36a51ca1931c84f2ef1b3dc88c6ed3fdea963dfa67026292a14b094ee8ca340f08d0a09393685494f5b7563af64d3405fdfacb509e9b32de1cfc8dc82dd3c4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks