General

  • Target

    20ae18835914f775fe36a135dcdc4554705cfab177ee8987c0a65f30706ff22e

  • Size

    98KB

  • Sample

    220520-1y2ybahfcl

  • MD5

    a381ad19a163cdc159823991fa10b432

  • SHA1

    2bd5bb4d61723eba125ea70b38e1d918cb6d9cc8

  • SHA256

    20ae18835914f775fe36a135dcdc4554705cfab177ee8987c0a65f30706ff22e

  • SHA512

    8ab89f3213234af05e5fc8df29713af884fdc41ee755e75d6ce671365889503d61d9626b92d2b6953032eba599cfb12a93b30c7f680169f7d70bff1bc75999db

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      a609e6e8558854fcf0790ea63c140636

    • SHA1

      32f420b41bffa36e7e4f36ff3b1897e20359b5e8

    • SHA256

      0bb088266c59f91fde3293f80935b197971c500a8971a26037706aaf5e520a5d

    • SHA512

      4f695d52ad1b64aa65ef11afc1add8f243b0d1eee0a4a2af3532d833f9542e0086e3d55bb0f041040661cfecc69112477bbe50b7e8692b2a9d82f1c584735de4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks