General

  • Target

    2ec3f8494cb4c00abe5d1a93175d801a5fc0c01748f3791cf18092983eda287f

  • Size

    98KB

  • Sample

    220520-1wcweaech7

  • MD5

    13c1aed80b91f34b9cc0a0a4199fc5fc

  • SHA1

    435d51fe09c0c9fb8d7d4d835e2584f8ddf738d9

  • SHA256

    2ec3f8494cb4c00abe5d1a93175d801a5fc0c01748f3791cf18092983eda287f

  • SHA512

    c25101a27fe0f7faf77a11f7988f16ba2051f8c2bd7889c711f042fd36b8681dc185f03191e2fd8b949c624d1d57b189c49b6c51e3063b2814694dd047e6d5fa

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      28b09e17a8819c703bd6600e62b5407a

    • SHA1

      363b51c1f483093eae802ad6939363a50bbf9b4d

    • SHA256

      23f6ed44eda0ab1b7274653b618ac891a8cbd3c467f8b658297cf68173bb842f

    • SHA512

      7e1408590957ab36dc608f3a4c5fd5dc81ce71032796fefd30257b4fd2f782b824268e20745c7a450c56dc0e12888ea6377f3e4f420ae93001cdfcfb8628d7cf

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks