General

  • Target

    4c32a8984c672cbf74049a8a8e08f3a85a777f10688f87cf9e6e5fec467e89f6

  • Size

    98KB

  • Sample

    220520-1qjrrsebg4

  • MD5

    02cd9f088b3c69b99dd4416eaec29763

  • SHA1

    c187a8e9bc77f80a6f8bc51278a7e71f346a9deb

  • SHA256

    4c32a8984c672cbf74049a8a8e08f3a85a777f10688f87cf9e6e5fec467e89f6

  • SHA512

    9ba582ca7461ece343b1b4e7088f9b75831b4a01337b7d6c33661185cac83d73ead937e647de376a5e3048caf81d8335f4493a02d01ae48e03653615c8e194a9

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      293cebe3db8617cdf312d397697ac849

    • SHA1

      b3cb21b4f0bedba71a08a2f252a4d5461626d40d

    • SHA256

      a5b4fca70c16e40a7c4bad03de3c8f0448aea24ebbf989026202c94a9eeee7f8

    • SHA512

      c3cc31e48915d60b36941eeb5e4d3126a5ddd886a7f81354fb0a85311f2687e99bc7f407c3f1ea94067f1d260d05b992cf8ad73351088cc6a58e13f4286e6cd0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks