General

  • Target

    2431f3aeecea07067e508601af51f3054779a743459815e1e93b6d90cd9d05ad

  • Size

    98KB

  • Sample

    220520-1yccnahfak

  • MD5

    6a3d3deffafe2be190de9851da9fa22e

  • SHA1

    00f5fdb81726d207dc09acf7ef1f8f21522616cc

  • SHA256

    2431f3aeecea07067e508601af51f3054779a743459815e1e93b6d90cd9d05ad

  • SHA512

    4860b8b1032b2848f6189d6e451e66848be1863205163439ebf3f6433edc661192d6ba9d7dc0d209b30f1caf146003bb4308ea903f49c7119b0e5ec3e1b14f9f

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      07396ff750c57b957fe77ed3d097e968

    • SHA1

      58f890e23ab290dd39d47d6559de077ab5449ac3

    • SHA256

      d027cb8eafb09df8996aed9c328bd00510ec194f4ac704b357509bb2a0d823cd

    • SHA512

      42d5e813e23fe23f994badc9082358706a104fa26f714f8e6a6be5d80b898d4cc151cf63dbd3b5e0a145378e64db0878cba83df149cedea2fc59e8fb2cee170d

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks