General

  • Target

    e13b9bf9d03d25fea984a5ec113277a7ee1b22941e392cc3614867c272dd3fc4

  • Size

    160KB

  • Sample

    220724-y8s22sfce4

  • MD5

    1f8bfc4b4bd9efd8f6f5ffd29ec63b8a

  • SHA1

    adbc24fed7a68f97dd1a294c91d226b63bdbc7ca

  • SHA256

    e13b9bf9d03d25fea984a5ec113277a7ee1b22941e392cc3614867c272dd3fc4

  • SHA512

    1b35272f31b301d4386445d089ca4bdbc5ace2eebdbc4ecb612779e46003863aaeb77e610a325e8f22033fe8fb861aa98cd3da9ca908c9380bd843907a9b17cb

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://pressuredspeech.com/dngn/cEmgNTByQ/

exe.dropper

https://phoneringtones.info/wp-content/uploads/qx93_k68trw3j-15334/

exe.dropper

http://safeservicesfze.com/wp-admin/ZmVYmAXv/

exe.dropper

https://freewallpaperdesktop.com/wp-includes/50lz_zkln03lbc-8209361/

exe.dropper

http://noingoaithatthanhnam.com/wp-admin/voytvHre/

Targets

    • Target

      e13b9bf9d03d25fea984a5ec113277a7ee1b22941e392cc3614867c272dd3fc4

    • Size

      160KB

    • MD5

      1f8bfc4b4bd9efd8f6f5ffd29ec63b8a

    • SHA1

      adbc24fed7a68f97dd1a294c91d226b63bdbc7ca

    • SHA256

      e13b9bf9d03d25fea984a5ec113277a7ee1b22941e392cc3614867c272dd3fc4

    • SHA512

      1b35272f31b301d4386445d089ca4bdbc5ace2eebdbc4ecb612779e46003863aaeb77e610a325e8f22033fe8fb861aa98cd3da9ca908c9380bd843907a9b17cb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks