General
-
Target
home.php
-
Size
93B
-
Sample
240627-x53awawfrh
-
MD5
b0d506893d4802090edf1644f5f082cd
-
SHA1
4bf0d7ecb70703857c7029754fa02a7496313b63
-
SHA256
0d3e98ca727fc1201b436170af5a63f23348aaf146a3ac6234f6c4da283e8b34
-
SHA512
9a104d02dd1afb7b1d7c26715fa650c3f1519744af8f57a57c1a8d39a1d75b16d3ca5da8e6e00966ebe2d73a9983679710585318acfed67804c4856b6d1928e5
Static task
static1
Behavioral task
behavioral1
Sample
home.html
Resource
win11-20240508-en
Malware Config
Extracted
http://blockchainjoblist.com/wp-admin/014080/
https://womenempowermentpakistan.com/wp-admin/paba5q52/
https://atnimanvilla.com/wp-content/073735/
https://yeuquynhnhai.com/upload/41830/
https://deepikarai.com/js/4bzs6/
Targets
-
-
Target
home.php
-
Size
93B
-
MD5
b0d506893d4802090edf1644f5f082cd
-
SHA1
4bf0d7ecb70703857c7029754fa02a7496313b63
-
SHA256
0d3e98ca727fc1201b436170af5a63f23348aaf146a3ac6234f6c4da283e8b34
-
SHA512
9a104d02dd1afb7b1d7c26715fa650c3f1519744af8f57a57c1a8d39a1d75b16d3ca5da8e6e00966ebe2d73a9983679710585318acfed67804c4856b6d1928e5
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-