General

  • Target

    1ff8a5ef8a5cbf054d243282e6e9765fb76f933e35c4301dc66ac8b2dc6f807b

  • Size

    281KB

  • Sample

    220731-kd2ttagcb2

  • MD5

    1b50904ec0f85df5a04b71b4861fadf6

  • SHA1

    cc60646c0b91941889e7c7e77634b7ad1b3ffe1b

  • SHA256

    1ff8a5ef8a5cbf054d243282e6e9765fb76f933e35c4301dc66ac8b2dc6f807b

  • SHA512

    a802926dab3dfbd5ff719963fd23f92ed5dadcbbd0fd24efb7a6b56772df7f2dda32968ac5d7cc78e3fd0fdf5e16f6cf4ded7db763b17dca1609824deb170ec4

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://thesilverant.com/test/dvr9/

exe.dropper

http://firstmnd.com/wp/wp-content/3k960/

exe.dropper

http://citylandgovap.net/8dqs5fv/6J/

exe.dropper

http://deredia.com/cgi-bin/cbas/

exe.dropper

http://fattoriaiponti.com/wp-admin/o1wiEqPfN/

Targets

    • Target

      1ff8a5ef8a5cbf054d243282e6e9765fb76f933e35c4301dc66ac8b2dc6f807b

    • Size

      281KB

    • MD5

      1b50904ec0f85df5a04b71b4861fadf6

    • SHA1

      cc60646c0b91941889e7c7e77634b7ad1b3ffe1b

    • SHA256

      1ff8a5ef8a5cbf054d243282e6e9765fb76f933e35c4301dc66ac8b2dc6f807b

    • SHA512

      a802926dab3dfbd5ff719963fd23f92ed5dadcbbd0fd24efb7a6b56772df7f2dda32968ac5d7cc78e3fd0fdf5e16f6cf4ded7db763b17dca1609824deb170ec4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks