General

  • Target

    4eac733c3baf2c0bbbe15182edbab80fe81a0a8945d9654a0853043c44285be6

  • Size

    98KB

  • Sample

    220520-1pyjjahcgq

  • MD5

    41ebdf739c9d0e7d4a20b01c81ec783b

  • SHA1

    0a67b7d1592730c63b0d528e1fc2a23ac055ca0a

  • SHA256

    4eac733c3baf2c0bbbe15182edbab80fe81a0a8945d9654a0853043c44285be6

  • SHA512

    132fd911403641ca62b5ad3baa0d935df2fb8bcf14df1ef5fa75abb67aa6c84e6f775171596703d13cf3c8cf1d17cce511ff0664aa86568a26a614830cc95da0

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      ba46a3bd260cabcd0d0076028d253438

    • SHA1

      f747a6e3d9dc5dbd0ec8685757e741ecf37d5bd7

    • SHA256

      68fa39fdeeb2482b9dbec2a1c2a7649e0a1e4b883528ef42b407a240bac4065e

    • SHA512

      b74f3f049ca48448ca9c7a240c6124fe359ff7a6316ba22cefb720b2f4a827583f58b33e029e9abdeb674308192b0d5db33b58526e2e1979b2c4925db4df01bc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks