General

  • Target

    1e7619ea43467167cade758f8d611b25d40c2a3e93ca541e6acfd4ede2c81b29

  • Size

    153KB

  • Sample

    220520-1zdbcaedh5

  • MD5

    6d713af398101fb1ce7c6cd4831fd01e

  • SHA1

    83be76755052d2a67ea1f07d4de4b937327e19fe

  • SHA256

    1e7619ea43467167cade758f8d611b25d40c2a3e93ca541e6acfd4ede2c81b29

  • SHA512

    2b0a9adafb002b3f2fb7f62fdee15572aa7883554b4780474aaaa1b2c82759c13ad3c6868f95c9399ee685094cb2b469b127f7fbf48567fb3f87b8ae178d7d3a

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://62.171.152.105/Hfhue723bhDSF9uyhfwe

Targets

    • Target

      1e7619ea43467167cade758f8d611b25d40c2a3e93ca541e6acfd4ede2c81b29

    • Size

      153KB

    • MD5

      6d713af398101fb1ce7c6cd4831fd01e

    • SHA1

      83be76755052d2a67ea1f07d4de4b937327e19fe

    • SHA256

      1e7619ea43467167cade758f8d611b25d40c2a3e93ca541e6acfd4ede2c81b29

    • SHA512

      2b0a9adafb002b3f2fb7f62fdee15572aa7883554b4780474aaaa1b2c82759c13ad3c6868f95c9399ee685094cb2b469b127f7fbf48567fb3f87b8ae178d7d3a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks