General

  • Target

    cbqdedgl

  • Size

    238KB

  • Sample

    220522-f1h8rsahej

  • MD5

    ed4208fb279021678a791818606d3981

  • SHA1

    5eb08220ced38b83488ec0403cab60262c90636d

  • SHA256

    493fbab43b8eaf0772394866842fa9474e8e54a84894498828af06590dff1cbd

  • SHA512

    fe1a4722d90f4120e2e8eb8a43dcfc956c8ea32efc69bd2b88779460af02fa2038342f2483b4d4ef52b886d1500f8e9bbc1ccc3ed4f4a422809030ea3f742aff

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://saimission.org/sai/fU/

exe.dropper

https://toprakmedia.com/cgi-bin/F/

exe.dropper

http://tonmeister-berlin.de/Dokumente/Zqmb3/

exe.dropper

http://www.essand.com/test/SOx5LA/

exe.dropper

http://gzamora.es/9s52_ou17husakvth9fs_resource/sFe3aa/

exe.dropper

http://powerfrog.net/Anna/ifqE/

exe.dropper

http://sasystemsuk.com/recruit/H/

Targets

    • Target

      cbqdedgl

    • Size

      238KB

    • MD5

      ed4208fb279021678a791818606d3981

    • SHA1

      5eb08220ced38b83488ec0403cab60262c90636d

    • SHA256

      493fbab43b8eaf0772394866842fa9474e8e54a84894498828af06590dff1cbd

    • SHA512

      fe1a4722d90f4120e2e8eb8a43dcfc956c8ea32efc69bd2b88779460af02fa2038342f2483b4d4ef52b886d1500f8e9bbc1ccc3ed4f4a422809030ea3f742aff

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks