General

  • Target

    list-20200820-0087792.doc

  • Size

    238KB

  • Sample

    230630-p4f29adg6v

  • MD5

    835f29dac8723760261ebf8bf69906fc

  • SHA1

    be3b3e10bc6d68afbe3995a5b11cf655f769adb8

  • SHA256

    739d1a0cb32d1185c3a29e2fdba23d010d6f89076810095357750c6960ddbfd4

  • SHA512

    2e96baeddfb2e118831b4577fa171d6c3329c7aa7cf1fb461bea894a13fa54931532602b9d38c2a0c7098e919bc768ab72318f254ad88f5f147f34183696cee9

  • SSDEEP

    3072:Aj6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkZ6QLtt7gawog:AHgtEWPsL/aTyT9GkxT7gawog

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.yikeyuedu.com/wp-includes/Zf/

exe.dropper

https://ywqzz.com/wp-includes/U/

exe.dropper

https://masteringroi.com/roiroi/theme/60/

exe.dropper

http://dootnaturals.com/wp-content/Xq/

exe.dropper

https://colco-seminare.de/WordPress_05/H/

exe.dropper

http://bautech-nickels.de/angebote/9/

exe.dropper

http://conceptis.de/cgi-bin/m/

Targets

    • Target

      list-20200820-0087792.doc

    • Size

      238KB

    • MD5

      835f29dac8723760261ebf8bf69906fc

    • SHA1

      be3b3e10bc6d68afbe3995a5b11cf655f769adb8

    • SHA256

      739d1a0cb32d1185c3a29e2fdba23d010d6f89076810095357750c6960ddbfd4

    • SHA512

      2e96baeddfb2e118831b4577fa171d6c3329c7aa7cf1fb461bea894a13fa54931532602b9d38c2a0c7098e919bc768ab72318f254ad88f5f147f34183696cee9

    • SSDEEP

      3072:Aj6yw1MgpQiBhGWb6esLbTh8YuyDRBFtdfGkZ6QLtt7gawog:AHgtEWPsL/aTyT9GkxT7gawog

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks