General

  • Target

    728d0def3186dc60e0b0ae365fe750930be37151b1a1e8165a25288026dd2b16

  • Size

    146KB

  • Sample

    220625-k5k1dagec3

  • MD5

    13a08d07bf9168fd0cda074234f02330

  • SHA1

    cafb64ca399c6df7581aa40d0b47a528f7a05b11

  • SHA256

    728d0def3186dc60e0b0ae365fe750930be37151b1a1e8165a25288026dd2b16

  • SHA512

    4eeedfa1929883375b339e230988cecfa41a86cd75b0c821aaf860c07a0dc58afbbe86b01d6d8f808515f0d4b660f54728f0493a126628ae011a0ee97afda6f3

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://mireiatorrent.com/wp-includes/bj07f0biw9_0sj91efi-0/

exe.dropper

http://msograteful.com/codImwUJbt/

exe.dropper

http://escoder.net/cgi-bin/OmrZcAEqS/

exe.dropper

http://priyainfosys.com/products/FSrnZTOgOA/

exe.dropper

http://llona.net/bqi776dm_agvux-6816533798/

Targets

    • Target

      728d0def3186dc60e0b0ae365fe750930be37151b1a1e8165a25288026dd2b16

    • Size

      146KB

    • MD5

      13a08d07bf9168fd0cda074234f02330

    • SHA1

      cafb64ca399c6df7581aa40d0b47a528f7a05b11

    • SHA256

      728d0def3186dc60e0b0ae365fe750930be37151b1a1e8165a25288026dd2b16

    • SHA512

      4eeedfa1929883375b339e230988cecfa41a86cd75b0c821aaf860c07a0dc58afbbe86b01d6d8f808515f0d4b660f54728f0493a126628ae011a0ee97afda6f3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks