General

  • Target

    fddwfhwu

  • Size

    178KB

  • Sample

    220522-f3y21abafj

  • MD5

    8edc3c8487342e650a803d995eda3aee

  • SHA1

    eed3e8ce919a1ed602997d1a1137f8d19a554b25

  • SHA256

    d264878eae29d3da022f38e67a38560346ba42cbb6dbebbf0e6c852c666fb1ac

  • SHA512

    1b7500d183db31f3f5eefd80a62a9eaf36aff9024c7c2b37f5e8525b3633db4bab7441ea2e7914cec269bf6a9d403b55273295f6953fda53ab1906c2d986d272

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.hhbiao.com/ro/hEGGg/

exe.dropper

https://kissanime24.com/anime/tnqblnm875789/

exe.dropper

http://ahansatan.com/wp-admin/IPTpsJjvkKHDM/

exe.dropper

http://goldoni.co.uk/bmnfg411/qQmxCDIzDcR/

exe.dropper

http://hirken.com.au/images/kul5uy3a48/

exe.dropper

http://hofhuistechniek.nl/localhost/ZDN9mtkv7hsl25097064/

exe.dropper

http://itcnt.com.np/2xk_kxs_r3u3g4/u2ka4qa5362685/

Targets

    • Target

      fddwfhwu

    • Size

      178KB

    • MD5

      8edc3c8487342e650a803d995eda3aee

    • SHA1

      eed3e8ce919a1ed602997d1a1137f8d19a554b25

    • SHA256

      d264878eae29d3da022f38e67a38560346ba42cbb6dbebbf0e6c852c666fb1ac

    • SHA512

      1b7500d183db31f3f5eefd80a62a9eaf36aff9024c7c2b37f5e8525b3633db4bab7441ea2e7914cec269bf6a9d403b55273295f6953fda53ab1906c2d986d272

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks