General

  • Target

    2314dcd7f3e189697f1edde63057928f620e475dee068badffb70756883bd06f

  • Size

    98KB

  • Sample

    220520-1yh57sedf2

  • MD5

    69c18eb2e0b308b91b8935b32ec89087

  • SHA1

    a62dcf19466c7c70d0554e52d3cc4eb630eade0e

  • SHA256

    2314dcd7f3e189697f1edde63057928f620e475dee068badffb70756883bd06f

  • SHA512

    41de7544929fe35cccd9d8ece08b249e14d825e28afea82ddbde41e4f65ffa0c2d1fe5991abbea7b5f2bbf2042b08f5b8b4bfa24cbbd8beb66411ecdf9d5ae6b

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      168KB

    • MD5

      7393e24572de4c8663c96e8efb23811f

    • SHA1

      17821038656d058591dc8044c33bce865e8ee92f

    • SHA256

      be7069b8f5657e3745e4cc7b97f0857267965b5ee18d2b059483b5ab4ccc4b20

    • SHA512

      7f1801cac93db10a6728740f0185d3e842b05115292a2c67bf121f8eaa164c80b7820e4554c6d4b451c318f907fcec46a526c2b168bc8938444c8d9acd8ed94c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks