General

  • Target

    493b332e61b1b578a0f350d23f840af5bb324a09b83c260df1e6adffd34f4aec

  • Size

    98KB

  • Sample

    220520-1qywpahdar

  • MD5

    a7563567de4ba732b54f4c8bab3e4208

  • SHA1

    feb2e6573f8233a6b4690851d47076b66444932f

  • SHA256

    493b332e61b1b578a0f350d23f840af5bb324a09b83c260df1e6adffd34f4aec

  • SHA512

    0c8e36fb469ffd22019cb0f5a4b37280b79f467802583a4866ea6217f38f39836fa129ded44253abcf124077e49c40f72d9f98c7750ae14e9123b6a3d75d4dba

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      ff141a473fab0488e92f663ee5ee26b5

    • SHA1

      d23918ab34fc19f643594ae8c6ac7c2ebb9a43ba

    • SHA256

      62112657085b9dc12429d5002978a67b6a792db61dca0bfd23db9d5370717ec5

    • SHA512

      53adb68f238ac6c6b8125b4924ae38aaeda4cfb95d31daeb4faef7b7e342253982f322abec8dac52aea9f8e67008426a3e7a91408288739ac90d20c025c6be10

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks