General

  • Target

    ?i=1bfyoaatp

  • Size

    141KB

  • Sample

    220522-f57f6abbhj

  • MD5

    716c3aa1e0da98b6e99cadd60363ae7e

  • SHA1

    094623e555e4d525293ae7fa240bc445a3fbcecd

  • SHA256

    64c6ba33444e5db3cc9c99613d04fd163ec1971ee5eb90041a17068e37578fc0

  • SHA512

    33e38852e549d3df110431c9345c70168a4aff1324fef80e13086f0353f6566c488a893f1e82c01d37fbe9add167188844207d3408898d851981e6a3ddfdad6c

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://chupahfashion.com/eh6bwxk/bowptl/cLo9eq8v8Vht/

exe.dropper

http://ancyh.xyz/Fox-C/LxAhgyO3fMg/

exe.dropper

http://gravton-dev-cms.policyfest.com/Fox-C/BMOkGelwu/

exe.dropper

https://capitalui.futuristic.agency/wp-admin/hwi9bnmXFFm3doo/

exe.dropper

http://cptdmy.com/zqtr/zdJE0jEOxL/

exe.dropper

https://weviralyou.com/wp-content/yl5qV15jWWfaGdSZLR/

exe.dropper

https://megabyte-xtnegocios.com/ys3v1clw/AKm6Q9/

exe.dropper

https://vmsparamedical.com/urjk0xr/PhfwL/

exe.dropper

https://viprait.com/lag5gn/cdy6k/

exe.dropper

https://comingsoon.futuristic.agency/svg/p4xODmupFbHPnr/

Targets

    • Target

      ?i=1bfyoaatp

    • Size

      141KB

    • MD5

      716c3aa1e0da98b6e99cadd60363ae7e

    • SHA1

      094623e555e4d525293ae7fa240bc445a3fbcecd

    • SHA256

      64c6ba33444e5db3cc9c99613d04fd163ec1971ee5eb90041a17068e37578fc0

    • SHA512

      33e38852e549d3df110431c9345c70168a4aff1324fef80e13086f0353f6566c488a893f1e82c01d37fbe9add167188844207d3408898d851981e6a3ddfdad6c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks