General

  • Target

    bplbghbw

  • Size

    229KB

  • Sample

    220522-fz3wsafef8

  • MD5

    cefc8ee1ec8fa122f1926762f25e517a

  • SHA1

    0b95e029e551daa0413d04ac19a482276d3c5cd6

  • SHA256

    489e84c61f0e1903d9276dc7bba7fe7f936f26076d1276f41c8c52b3e3f2ffaf

  • SHA512

    4229542fab204af6386fb1af65cc9e72eba2d753c537af9c82d15f600b941faf4558c2e3597c62d79c4f99138bbb13823d9db6934ba412e156138a1f599c8bde

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://harugomnhat.mizi.vn/lfv9u/Yc31L165329/

exe.dropper

http://betmagik.com/wp-includes/e6eT18030/

exe.dropper

http://aofortunes.com/9gipx/wOOY59/

exe.dropper

http://yourman.co.uk/hWftFfZpx/uRkkm0115/

exe.dropper

https://serenitynailsfranklin.com/wp-includes/OU50007/

Targets

    • Target

      bplbghbw

    • Size

      229KB

    • MD5

      cefc8ee1ec8fa122f1926762f25e517a

    • SHA1

      0b95e029e551daa0413d04ac19a482276d3c5cd6

    • SHA256

      489e84c61f0e1903d9276dc7bba7fe7f936f26076d1276f41c8c52b3e3f2ffaf

    • SHA512

      4229542fab204af6386fb1af65cc9e72eba2d753c537af9c82d15f600b941faf4558c2e3597c62d79c4f99138bbb13823d9db6934ba412e156138a1f599c8bde

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks