General

  • Target

    SecuriteInfo.com.Exploit.Siggen3.17149.11632.3300

  • Size

    38KB

  • Sample

    220816-jldlhshab2

  • MD5

    6a50db57cd89b13482023a5a67e5c89d

  • SHA1

    c121420f9604e2101e9d1f8de7d8676d817c22f7

  • SHA256

    dac74ef0e89ee9ed60e53adf867cb9d4d73e5976b9b87daabf113a7f44ed681f

  • SHA512

    54c42111b550089bbc3a97c66a57a009baa560ada0a7b688a5ba885afa2e891109d2d70821fd4e25d62cf9b403db8d465cbd50c8a5c503ea8ab2aa38ea7cd2e7

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://facextrade.com.br/wp-includes/certificates/4.txt

Targets

    • Target

      SecuriteInfo.com.Exploit.Siggen3.17149.11632.3300

    • Size

      38KB

    • MD5

      6a50db57cd89b13482023a5a67e5c89d

    • SHA1

      c121420f9604e2101e9d1f8de7d8676d817c22f7

    • SHA256

      dac74ef0e89ee9ed60e53adf867cb9d4d73e5976b9b87daabf113a7f44ed681f

    • SHA512

      54c42111b550089bbc3a97c66a57a009baa560ada0a7b688a5ba885afa2e891109d2d70821fd4e25d62cf9b403db8d465cbd50c8a5c503ea8ab2aa38ea7cd2e7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks