General

  • Target

    933aeadba3464a27badfe55d8bafacbd07d2fe06a0047a8dd0b2e46d1bd1a647

  • Size

    133KB

  • Sample

    220725-d58m4sdccl

  • MD5

    91faa08527f0ad0acfb175f709d03dda

  • SHA1

    34c3832e3f52650f3232cd7cd0caa84e72f1caca

  • SHA256

    933aeadba3464a27badfe55d8bafacbd07d2fe06a0047a8dd0b2e46d1bd1a647

  • SHA512

    209dccda124d158272d19d06d73714a1026c91867940d4db2be7b4bc0428017aa7b5bf49c4ac37f63c3d071a6761063e273623d1fbbd9fc2db5b6dd68af278d2

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://www.funtelo.com/58S1xJ09

exe.dropper

http://www.shout4music.com/Kkt4CUPvX2

exe.dropper

http://advustech.com/l5EcamTDy

exe.dropper

http://www.ceeetwh.org/UZwh7EIWD6

exe.dropper

http://www.gmlsoftware.com/itTZIne5M

Targets

    • Target

      933aeadba3464a27badfe55d8bafacbd07d2fe06a0047a8dd0b2e46d1bd1a647

    • Size

      133KB

    • MD5

      91faa08527f0ad0acfb175f709d03dda

    • SHA1

      34c3832e3f52650f3232cd7cd0caa84e72f1caca

    • SHA256

      933aeadba3464a27badfe55d8bafacbd07d2fe06a0047a8dd0b2e46d1bd1a647

    • SHA512

      209dccda124d158272d19d06d73714a1026c91867940d4db2be7b4bc0428017aa7b5bf49c4ac37f63c3d071a6761063e273623d1fbbd9fc2db5b6dd68af278d2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks