General

  • Target

    601f561ef81acc5fcf13c24321cf8ff55f77bd99d28881daa6c2cdc0eb91e921

  • Size

    28KB

  • Sample

    221130-rj2vbsbb7t

  • MD5

    b8f3bd05ba309b145a93bf03c3f97106

  • SHA1

    c79a2d7427dbd7a05e1faf4e894dccfbf98304eb

  • SHA256

    601f561ef81acc5fcf13c24321cf8ff55f77bd99d28881daa6c2cdc0eb91e921

  • SHA512

    aa6634f3699eb2d1ef2ff48cefb7864bf4466f28c5fedf6ad43d40d83e5b509ad5f378d06145f2bcbb01a92a95dda7aea980db9af0cfe1cc5bcd90f2e9325d6f

  • SSDEEP

    768:+qDDovTEQ1MCf2W962F/XrNoa7PD3n4+KVj:+iCrMCo2F/PD34FVj

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://lokipanelhostingpanel.gq/work/worknew/16.exe

Targets

    • Target

      601f561ef81acc5fcf13c24321cf8ff55f77bd99d28881daa6c2cdc0eb91e921

    • Size

      28KB

    • MD5

      b8f3bd05ba309b145a93bf03c3f97106

    • SHA1

      c79a2d7427dbd7a05e1faf4e894dccfbf98304eb

    • SHA256

      601f561ef81acc5fcf13c24321cf8ff55f77bd99d28881daa6c2cdc0eb91e921

    • SHA512

      aa6634f3699eb2d1ef2ff48cefb7864bf4466f28c5fedf6ad43d40d83e5b509ad5f378d06145f2bcbb01a92a95dda7aea980db9af0cfe1cc5bcd90f2e9325d6f

    • SSDEEP

      768:+qDDovTEQ1MCf2W962F/XrNoa7PD3n4+KVj:+iCrMCo2F/PD34FVj

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks