General

  • Target

    a0f6ce6375c17dcd4052f315be17146c089c664a1552e0d1a3c3ecd1e8a6d6cf

  • Size

    95KB

  • Sample

    220724-zblgdafdc7

  • MD5

    186c67a706eb91c97ab9b550c5bd531b

  • SHA1

    35583941dec461c4045ecb4bfd0ebdd0e9a6c9de

  • SHA256

    a0f6ce6375c17dcd4052f315be17146c089c664a1552e0d1a3c3ecd1e8a6d6cf

  • SHA512

    fa772d641409088277fc9d51a2063ba55b25cb87fc9403f350a15c9cd0ec1ae9f6004cb6fbdae2ad60a9ed2dd480f119a824d772c659cb457ec7d35dd634f5b1

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://sundownbodrum.com/J335NbN

exe.dropper

http://www.roteirobrasil.com/wp-includes/XEBv3PdHgZ

exe.dropper

http://rdabih.org/m7mnTYaIzL

exe.dropper

http://zavgroup.net/11D6PwFu

exe.dropper

http://stefanobaldini.net/DfSVLfsC6

Targets

    • Target

      a0f6ce6375c17dcd4052f315be17146c089c664a1552e0d1a3c3ecd1e8a6d6cf

    • Size

      95KB

    • MD5

      186c67a706eb91c97ab9b550c5bd531b

    • SHA1

      35583941dec461c4045ecb4bfd0ebdd0e9a6c9de

    • SHA256

      a0f6ce6375c17dcd4052f315be17146c089c664a1552e0d1a3c3ecd1e8a6d6cf

    • SHA512

      fa772d641409088277fc9d51a2063ba55b25cb87fc9403f350a15c9cd0ec1ae9f6004cb6fbdae2ad60a9ed2dd480f119a824d772c659cb457ec7d35dd634f5b1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks