General

  • Target

    2c6d2d2ed356a2938dec308a738fe8abd789c77bea1d54b2cc38f37e3435ae53

  • Size

    98KB

  • Sample

    220520-1wt5paeda9

  • MD5

    55511270d5d1bda2b4b3181770a9aef8

  • SHA1

    d07a3fb11029a9de060fc28fd341242171967ab3

  • SHA256

    2c6d2d2ed356a2938dec308a738fe8abd789c77bea1d54b2cc38f37e3435ae53

  • SHA512

    f15facb2d32ea53820f8e6c4861b4980d9839bb36f0a060d446b808add8a761f90e4fa83df083329fb26910bbd1a48687eaa259071b4c9bf8b0f1e69ce1bbf8b

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      168KB

    • MD5

      a9f533936e483d29537770a7f46eee6f

    • SHA1

      f7a6b82c933ad5662a1f777e5bb802b6cedc0467

    • SHA256

      e268b10eb0bfb444dda5b889024b51736afed21d56dedd0bbda1446cea02ae1e

    • SHA512

      d08b17f1427f0680eb53ea7fbc604d32fc9ecbf7d4403bb5b462e8fccbab70c336ca411ca6775a123d01c8269f73119c3d2d0dddc69b3b5a61a2aa3870864f65

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks