General

  • Target

    e545364bfe8e1e072499b805fdba2566887c176ac004783879bb66b22983c671

  • Size

    144KB

  • Sample

    220725-e413baehcn

  • MD5

    731bcf6a87db0b1671fd9c7eae939472

  • SHA1

    92144bc0c0cdef85940d2e5fa41a9c015c76efda

  • SHA256

    e545364bfe8e1e072499b805fdba2566887c176ac004783879bb66b22983c671

  • SHA512

    bce268f935565493417fc95e0503baec6fd770f78729c1dc98368b45d5741f760aa1ff6bd5f8bf8ade20947171a781b8cf6de0918a7e32961d4862d396208045

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://wsme.net/cgi-bin/xH/

exe.dropper

http://justart.ma/wp-content/uploads/2019/01/Ti/

exe.dropper

http://majorpart.co.th/wp/qI/

exe.dropper

http://estudioalabi.com.ar/wp-admin/NvvP/

exe.dropper

http://marketinsight.hu/wp-includes/ly/

Targets

    • Target

      e545364bfe8e1e072499b805fdba2566887c176ac004783879bb66b22983c671

    • Size

      144KB

    • MD5

      731bcf6a87db0b1671fd9c7eae939472

    • SHA1

      92144bc0c0cdef85940d2e5fa41a9c015c76efda

    • SHA256

      e545364bfe8e1e072499b805fdba2566887c176ac004783879bb66b22983c671

    • SHA512

      bce268f935565493417fc95e0503baec6fd770f78729c1dc98368b45d5741f760aa1ff6bd5f8bf8ade20947171a781b8cf6de0918a7e32961d4862d396208045

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks