General

  • Target

    a87f8c17ebd946709b07aca9b846c4c3a766d567da3f9ab97c21cbbd81e34da3

  • Size

    98KB

  • Sample

    220520-z93hjsdfd9

  • MD5

    2e0ae931d5b7b6871f6207b132ea3dd3

  • SHA1

    d5395d5953a006a3140dc5aee50300d18bdcb8f0

  • SHA256

    a87f8c17ebd946709b07aca9b846c4c3a766d567da3f9ab97c21cbbd81e34da3

  • SHA512

    fdc1a3aae9baf6b0acdc4e07dbfc0e081fa09f98fb80a0730c5020dae779c13b995290d09d0fd12350167596ad25c89e4e6ca438435f01cffb7d6992ea955b3f

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      168KB

    • MD5

      6e085a8a086811e7468129fdc959af21

    • SHA1

      9069f7c4cfdd7902ddc78bd00038173dd51f4e0a

    • SHA256

      63c966c20ccc686dfa62a5063bff299d385ea9f159cc9a5b79dc59063fb9514f

    • SHA512

      7567a863318ad89124ae5dd2ded563fafd35f8e43e9b3666a58547dce8e89a6d67360afbeb25521693f863122046dc0503e30970cf8bcd086685651be5cca3c7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks