General

  • Target

    82e1e3df0f694eb0211a9d5291b43356953764557f25bd7b7b1de129b520ed17

  • Size

    153KB

  • Sample

    220520-1wgjlaheer

  • MD5

    d717d96065b8fb5fb93ba5766d96eb34

  • SHA1

    12039b3e2b7e484d70509b1aebc2ee778ad05fc3

  • SHA256

    82e1e3df0f694eb0211a9d5291b43356953764557f25bd7b7b1de129b520ed17

  • SHA512

    8f7514795ade123c0c35375c8f36e843925fcf735a441c1431e897bb4dbf9a28db6bd4dc68c2fcbe1fe735793171c258661d5ed9ec6cdb4fe58d5aa692a4411e

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://think1.com/wp-content/upgrade/2na4-4q5g-751619964/

exe.dropper

http://broadpeakdefense.com/fbsgf/McZcBMeM/

exe.dropper

https://lecairtravels.com/wp-admin/bXwjcdeg/

exe.dropper

https://www.biyunhui.com/fj/wbTKndf/

exe.dropper

http://nautcoins.com/wp-includes/AcZxFxQ/

Targets

    • Target

      82e1e3df0f694eb0211a9d5291b43356953764557f25bd7b7b1de129b520ed17

    • Size

      153KB

    • MD5

      d717d96065b8fb5fb93ba5766d96eb34

    • SHA1

      12039b3e2b7e484d70509b1aebc2ee778ad05fc3

    • SHA256

      82e1e3df0f694eb0211a9d5291b43356953764557f25bd7b7b1de129b520ed17

    • SHA512

      8f7514795ade123c0c35375c8f36e843925fcf735a441c1431e897bb4dbf9a28db6bd4dc68c2fcbe1fe735793171c258661d5ed9ec6cdb4fe58d5aa692a4411e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks