General

  • Target

    azbtmhyi

  • Size

    232KB

  • Sample

    220522-fzjsxaahak

  • MD5

    97eb3bd0675dcb052eabfeacf7672f6e

  • SHA1

    e3194145498f8a785f830f9a271b9adf908cabf9

  • SHA256

    d4c076603f475a562c8771e360b65b734aba563731f4417b117ecfad4297d562

  • SHA512

    0793c47bc11435c2c0466f8559d76fb1493ab7d052340980c0ceca4e61709dd8f802345819a1aa56117cb94ff162e64de9b945568670abc8edd8bae620d37b13

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://xn--ruqumz1h0h.com/wp-content/zj/

exe.dropper

http://hemalrathod.com/BillGST/6Y/

exe.dropper

http://ipeconstrutora.com/cgi-bin/Zf/

exe.dropper

http://islamabadtrafficpolice.gov.pk/i/

exe.dropper

http://kogeisha.net/kansaiosakanagasaki-kenjinkai/Rxj/

exe.dropper

http://lalenga.cl/claudio/oMz/

exe.dropper

http://pedantas.eu/wp-snapshots/L/

Targets

    • Target

      azbtmhyi

    • Size

      232KB

    • MD5

      97eb3bd0675dcb052eabfeacf7672f6e

    • SHA1

      e3194145498f8a785f830f9a271b9adf908cabf9

    • SHA256

      d4c076603f475a562c8771e360b65b734aba563731f4417b117ecfad4297d562

    • SHA512

      0793c47bc11435c2c0466f8559d76fb1493ab7d052340980c0ceca4e61709dd8f802345819a1aa56117cb94ff162e64de9b945568670abc8edd8bae620d37b13

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks