General

  • Target

    a8fb356f98ac70f8541c784bae6685ba0e0381f5dabfb030d32cec5e2499634c

  • Size

    98KB

  • Sample

    220520-z9wd8sgggj

  • MD5

    aedb0e6d8b1e85d5ece8e9bbda69f79b

  • SHA1

    41143b5e3b291c3fed41fe32be0021f2651c1f20

  • SHA256

    a8fb356f98ac70f8541c784bae6685ba0e0381f5dabfb030d32cec5e2499634c

  • SHA512

    7a31b177d3295daff821cf393d2d143602fec70477215d824d8cc2a39c70c96fbbce09f2bdce2376a18627ca51d3db4d51aabda5710702791d55c82604f7a85e

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://manandvanwaterlooville.co.uk/wp-admin/prX892/

exe.dropper

https://uniral.com/captchasignup/4J579681/

exe.dropper

https://scyzm.net/lkx7/lqoH8S/

exe.dropper

https://amagna.nl/DZ9MzAobu3/37Z/

exe.dropper

https://nilinkeji.com/online/90fb31/

Targets

    • Target

      sample

    • Size

      169KB

    • MD5

      484bfdfec5742ade491aef716e253c6a

    • SHA1

      30a5778512aef149c40adb3e9292a7c8addac114

    • SHA256

      59353bd2a96cfde81847bcf1480a531f68a1fcf0738161455a352c5b9babe28f

    • SHA512

      68c82b5cb60622edf1dd420fe22ddfce92baf743b673bca19857381a334e18807589b7a1b400fd0c004b7bc96d78aafe2358f5573ae13e1e83bbf776e1e58058

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks