General

  • Target

    1f642685bd1f362d918f5568033fccf516e75af88646360b606f79c2b13f0c6a

  • Size

    98KB

  • Sample

    220520-1y6aqshfcn

  • MD5

    175112cd042800c1839f2dfcd41a50d6

  • SHA1

    3e9945b835a092ecc89e990e9ee70576fcb66c4a

  • SHA256

    1f642685bd1f362d918f5568033fccf516e75af88646360b606f79c2b13f0c6a

  • SHA512

    f4132f38205ec651d7773cb13899633ef23d9ba21474183ee563540f42c4b4e38c43cf55317a9065ba8ba7b76632cebcf8defe5d25f346b99f19cb9b3984b56d

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      168KB

    • MD5

      f241767e3a8ffa9df6a968c7bea97413

    • SHA1

      46fe2b8b04c24fdd66eb0efc345e3f0b159ccbc5

    • SHA256

      e984d53b336dd818e3eef16a2f8bf04eea19d132b7a1f1c82aff3cd7d1fcd01d

    • SHA512

      3b79cf3ba84efd17c406a8c8ea6d774d5189737cde9dfc9abf615827052d2b9312f78a1717ea2de304f9425c344292fc11d20b4828e1da14fc5c085ebeb8cb4e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks