General

  • Target

    SecuriteInfo.com.Exploit.Siggen3.17149.4489.28684

  • Size

    38KB

  • Sample

    220816-jldlhsebgn

  • MD5

    a5589d03da5b07fa9b035921b38ba29f

  • SHA1

    3468f6de4c2f018812c4393bffdc336ce8b73848

  • SHA256

    1f60b1d80f74e60f61191fa9867de7b95cf5f0df6ae545aab006ddd983eb467d

  • SHA512

    2e48471a36fa771c57e3d9779a1e61a56fddb629755d902bae4b52b976d093f5e8c5c04fd3fa22fe3785de33101a4374bb8fe00183e09a225654b67dab0e3efb

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://facextrade.com.br/wp-includes/certificates/4.txt

Targets

    • Target

      SecuriteInfo.com.Exploit.Siggen3.17149.4489.28684

    • Size

      38KB

    • MD5

      a5589d03da5b07fa9b035921b38ba29f

    • SHA1

      3468f6de4c2f018812c4393bffdc336ce8b73848

    • SHA256

      1f60b1d80f74e60f61191fa9867de7b95cf5f0df6ae545aab006ddd983eb467d

    • SHA512

      2e48471a36fa771c57e3d9779a1e61a56fddb629755d902bae4b52b976d093f5e8c5c04fd3fa22fe3785de33101a4374bb8fe00183e09a225654b67dab0e3efb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks