General

  • Target

    e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564

  • Size

    228KB

  • Sample

    220520-3d6f4sggb2

  • MD5

    f2af036df754bb60cffc435f360ec913

  • SHA1

    23c42e1880d75f893da1050d8b96c749bf601c3e

  • SHA256

    e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564

  • SHA512

    b327d8b4bc181ba0c0d69c62bf5bab3eda6795d41785e55b0544f805487bdaf36b0796368e3ddc54d8e0917bb3ebe1f50d1838ede476b772f147ba8dbdefd372

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://dautudatnenhoalac.com/wp-admin/DYAsI/

exe.dropper

http://www.bewebpreneur.com/wp-admin/daHN/

exe.dropper

http://www.allgreennmb.com/wp-content/themes/pridezz/t9iV/

exe.dropper

http://www.baiduwanba.com/css/Ubh/

exe.dropper

http://rileyaanestad.com/wp-includes/DXn1R/

Targets

    • Target

      e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564

    • Size

      228KB

    • MD5

      f2af036df754bb60cffc435f360ec913

    • SHA1

      23c42e1880d75f893da1050d8b96c749bf601c3e

    • SHA256

      e3467e09f74aed3c66b9966cee1c36b1ed161bc93782c48e98514ff3122f6564

    • SHA512

      b327d8b4bc181ba0c0d69c62bf5bab3eda6795d41785e55b0544f805487bdaf36b0796368e3ddc54d8e0917bb3ebe1f50d1838ede476b772f147ba8dbdefd372

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks