General

  • Target

    bc4281dd49f6651a0687351c1e03f7233df53ce5155e1040aa56883c187612b3

  • Size

    12KB

  • Sample

    220521-ptnpcagab3

  • MD5

    48be1f1540b9ffd903f32f3ab506c144

  • SHA1

    4232cf65dfd13f7a76babe43867aa9716237b49c

  • SHA256

    bc4281dd49f6651a0687351c1e03f7233df53ce5155e1040aa56883c187612b3

  • SHA512

    d2a831c737ed1b599298c3af60f976d6c90a943b32c62b87cc2bbe912fb1a3cdcbc382482cbcd2b53e846868ddf26f01d743753f88ea3d8c2874cfb6bf489815

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://swiftexpresscourier.vip/SH/cov.exe

Targets

    • Target

      bc4281dd49f6651a0687351c1e03f7233df53ce5155e1040aa56883c187612b3

    • Size

      12KB

    • MD5

      48be1f1540b9ffd903f32f3ab506c144

    • SHA1

      4232cf65dfd13f7a76babe43867aa9716237b49c

    • SHA256

      bc4281dd49f6651a0687351c1e03f7233df53ce5155e1040aa56883c187612b3

    • SHA512

      d2a831c737ed1b599298c3af60f976d6c90a943b32c62b87cc2bbe912fb1a3cdcbc382482cbcd2b53e846868ddf26f01d743753f88ea3d8c2874cfb6bf489815

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks