General

  • Target

    SecuriteInfo.com.Exploit.Siggen3.17149.3543.14552

  • Size

    38KB

  • Sample

    220816-jldlhshab3

  • MD5

    f758ac579e55bbc5fe8b729bfe99616c

  • SHA1

    6b91b14af7b7fa8cc7a7b25256eee7f14b4eb325

  • SHA256

    7b208abf05433369e1503ea96851a1b53eca58c6ef20dfaebf67c6813712cb89

  • SHA512

    e457e74b209dcd5524f2e943c1eb3c016d60ed3c3fdfc331fdf488bd242113c581b3f8e7c8b627822203febea19b85dadafca855c643b93b261419697458530e

Score
10/10

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

http://facextrade.com.br/wp-includes/certificates/4.txt

Targets

    • Target

      SecuriteInfo.com.Exploit.Siggen3.17149.3543.14552

    • Size

      38KB

    • MD5

      f758ac579e55bbc5fe8b729bfe99616c

    • SHA1

      6b91b14af7b7fa8cc7a7b25256eee7f14b4eb325

    • SHA256

      7b208abf05433369e1503ea96851a1b53eca58c6ef20dfaebf67c6813712cb89

    • SHA512

      e457e74b209dcd5524f2e943c1eb3c016d60ed3c3fdfc331fdf488bd242113c581b3f8e7c8b627822203febea19b85dadafca855c643b93b261419697458530e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks