General

  • Target

    b7d1bcec14532ab0556f398e2cc65e030dbbbd4fb11fbe75331d8f789db46a3f

  • Size

    118KB

  • Sample

    220521-efzjkscdaj

  • MD5

    5367bd79630a16faf6a76be2ff8c7f5d

  • SHA1

    6fc7709487361e253e77d828091d9086c2ed1ebd

  • SHA256

    b7d1bcec14532ab0556f398e2cc65e030dbbbd4fb11fbe75331d8f789db46a3f

  • SHA512

    fef7f5c109c1448c0bf66c074b314ff0f368ee3ec2f13c657251e9551b411f441dc436e56dc276d02ab206d485a86a90254ac0811e7ce818a09e740e5aa22975

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.agentstepp.com/ww12/6ZI/

exe.dropper

http://badaia.net/baiaseu/m4G4chJ/

exe.dropper

http://www.bambagiotti.it/shop/ymwU6/

exe.dropper

http://bbcalegal.com/attachments/AAyd/

exe.dropper

http://mezes.de/title_htm_files/Mb/

exe.dropper

http://computerfastfix.co.uk/css/DXj/

exe.dropper

http://sacentrs.lv/wp-content/uploads/2018/Cc/

Targets

    • Target

      sample

    • Size

      249KB

    • MD5

      850d33570779d1f3b1d4715dda7dbd69

    • SHA1

      cae32953f99a79bd3793de0a3592701039952c77

    • SHA256

      8dc53146fa1fa554598b41a8473bb728a08c62da3ad00731d4d4e83a3435232b

    • SHA512

      78d9e66be187139c6a7c0df4d699ffd038db2373e498aea50f0926e4cac374526aadfe5d4b91fca6b72d1482db81ee610d490915d409ca709000a33affdbbe9e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks