General

  • Target

    8527a735f27cf13a51f7a82055318dd78d9bb45564b8f653812fca32a84f79e1

  • Size

    235KB

  • Sample

    220520-2bxwhsfae9

  • MD5

    63f2aabe4d5b63d99e8fa956f47cd497

  • SHA1

    2d53c4209c25bf3c31572e35e2abd194342fe752

  • SHA256

    8527a735f27cf13a51f7a82055318dd78d9bb45564b8f653812fca32a84f79e1

  • SHA512

    63ed9363b3afe016203675fbf32504b3b803e19ec03ce3ab43c25897168f539952727b2f4f8bc808cd5302e76b5e104e4c5f7f515b053b1485083c1a83f605e7

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://thijsmorlion.com/wp-admin/h52077/

exe.dropper

http://thegioigas.com/Login/1g98/

exe.dropper

http://yy6262.com/wordpress/h670/

exe.dropper

http://thenews4views.com/9mcmnp3/2i36/

exe.dropper

http://queeniekawabe.com/all_photos/4el75/

Targets

    • Target

      8527a735f27cf13a51f7a82055318dd78d9bb45564b8f653812fca32a84f79e1

    • Size

      235KB

    • MD5

      63f2aabe4d5b63d99e8fa956f47cd497

    • SHA1

      2d53c4209c25bf3c31572e35e2abd194342fe752

    • SHA256

      8527a735f27cf13a51f7a82055318dd78d9bb45564b8f653812fca32a84f79e1

    • SHA512

      63ed9363b3afe016203675fbf32504b3b803e19ec03ce3ab43c25897168f539952727b2f4f8bc808cd5302e76b5e104e4c5f7f515b053b1485083c1a83f605e7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks