General

  • Target

    4a8fcbbd321f4de68edf390d3db939986c4aecc2656964662c886cb220a7f6e3

  • Size

    98KB

  • Sample

    220520-1qtxqshdak

  • MD5

    35fdc2f2f593c7a0af70a00c513fdcfb

  • SHA1

    f6af44dd10162c1c484f8be7b78e2243189f82c6

  • SHA256

    4a8fcbbd321f4de68edf390d3db939986c4aecc2656964662c886cb220a7f6e3

  • SHA512

    b049a6faaa65ea260329d3189edf279ad53346d75285def33402a22278f3c608c8973a2256e3bdc288ff5c3e1dd23c9f65952ba292f8b06f0b19a77795beae08

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      ec6f0b77b4f9a2c5146ba5d8f6671ba7

    • SHA1

      42c44709d340c2e83f90611a116e77f1fc3543a3

    • SHA256

      84cce9a551dc2eb66990351d4d17dd8c37f457ad337bcb9984231f608208258a

    • SHA512

      52f5baf2a47ebdeefa23109fd9c3a3cd34f28c2beb0e797b335d945bf1c8b71faa3d63add6a0b3bfed3ef27fca0d1381323af81ddf1acfd6febf18a5d13f510e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks