General

  • Target

    2899b6841f0906141c249b1557b39b7989ee98c7172bdbf5e366c8f2e8a8fb89

  • Size

    127KB

  • Sample

    220725-e8mqgsfbaj

  • MD5

    5b6000ef0f25e0bc46f3f31204f4700b

  • SHA1

    ac84b02f593cd905232b82b4629c7af6be31f577

  • SHA256

    2899b6841f0906141c249b1557b39b7989ee98c7172bdbf5e366c8f2e8a8fb89

  • SHA512

    266c49669b211649cfe122541488acc5ebfeac535cae101bb81e075530e5212112c08fb0632b5fae93926641cae9b575c58970d5d8a7e969312c9cf7320996a3

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://securityone-eg.com/wp-content/c6zvhffmx_6skfqch2lf-4721/

exe.dropper

http://randewoo.ir/profiles/50sq_qqdxeeln-04257/

exe.dropper

https://www.aseanlegaltech.com/wp-includes/lFhhBfMMLK/

exe.dropper

https://cybermagicindia.com/images/ur82i_90jm6p-55532/

exe.dropper

http://3rdperson.ml/wp-includes/eEEGYADPv/

Targets

    • Target

      2899b6841f0906141c249b1557b39b7989ee98c7172bdbf5e366c8f2e8a8fb89

    • Size

      127KB

    • MD5

      5b6000ef0f25e0bc46f3f31204f4700b

    • SHA1

      ac84b02f593cd905232b82b4629c7af6be31f577

    • SHA256

      2899b6841f0906141c249b1557b39b7989ee98c7172bdbf5e366c8f2e8a8fb89

    • SHA512

      266c49669b211649cfe122541488acc5ebfeac535cae101bb81e075530e5212112c08fb0632b5fae93926641cae9b575c58970d5d8a7e969312c9cf7320996a3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks