General

  • Target

    c378387344e0a552dc065de6bfa607fd26e0b5c569751c79fbf9c6f2e91c9807.zip

  • Size

    102KB

  • Sample

    221122-j6p52sfb78

  • MD5

    1cccca01351199acb0cf50f9ac7b5605

  • SHA1

    698344c1065d543bff0d35fbec1cb40734ac45bd

  • SHA256

    2c5d94a3161992b5d02cd487b8e626f303273e58039a785a7191a0f909b686be

  • SHA512

    b8da5ec17e6caefaa9f061ee2b57212ba07e280c085be9557a4e2119fd149195fca80c5169c546e8a51badff34fd23ae3110d55b98847e0cc0f128ba5e69fb4c

  • SSDEEP

    3072:fKeMWGpOjnN4M8U91qa+rrqnR+yX1+ssvAibKkK7dry:kW7raDU9wrqRt+hTbKkQdm

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://blockchainjoblist.com/wp-admin/014080/

exe.dropper

https://womenempowermentpakistan.com/wp-admin/paba5q52/

exe.dropper

https://atnimanvilla.com/wp-content/073735/

exe.dropper

https://yeuquynhnhai.com/upload/41830/

exe.dropper

https://deepikarai.com/js/4bzs6/

Targets

    • Target

      Datei 1609(2).doc

    • Size

      139KB

    • MD5

      b92021ca10aed3046fc3be5ac1c2a094

    • SHA1

      0fb1ad5b53cdd09a7268c823ec796a6e623f086f

    • SHA256

      c378387344e0a552dc065de6bfa607fd26e0b5c569751c79fbf9c6f2e91c9807

    • SHA512

      bbeb5cfd7c5a890456b0805234a9ae325abc4a08dbad70b4ed1b3635dee4470a1f86869d5532809cecb595b9a89708f378921d733bd061aef693bfc5ee77ebb4

    • SSDEEP

      3072:/Msknok2er/yR5DpQKajNDu1CkBwN0pqJfWSq:zkoRoKDpQZqQkmN0scR

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks