General

  • Target

    0e78a2fb957ed535df8419efeb6836d27b504181b5ee2f37439934055638d608

  • Size

    1.0MB

  • Sample

    241120-nbf14swgkj

  • MD5

    5791e96868c0d8b20b8b05d706c6a3d6

  • SHA1

    5c137d3fc9606c11a30d64e8de9e22ddaaf68438

  • SHA256

    0e78a2fb957ed535df8419efeb6836d27b504181b5ee2f37439934055638d608

  • SHA512

    2f250942197e0a62a5f408dbf3b639040d62ae30f9e8e9f71772120896453af38cf9ba4615ec1c784e3b5430b2b65365ed68a7273791c0d86a613119b95f2e8a

  • SSDEEP

    24576:Pz4RMDSWqDCesueeQG50ZPzfvKBcv88PPE4v:rgM2ZDBsuFv0ZDWh83Eg

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://electronicsvibes.com/wp-includes/3F/

exe.dropper

https://dubai-homes.ae/wp-admin/HX8/

exe.dropper

http://metalurgicanunes.com.br/wp-admin/a0I/

exe.dropper

http://greensync.com.br/aspnet_clientOld/w/

exe.dropper

http://rydchile.cl/wp-content/rm/

exe.dropper

http://www.sprxmy.top/wp-content/jV1/

exe.dropper

http://microsite.buniyad.info/ynbgl/kj/

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.productsofindiareviews.com/css/9Ut/

exe.dropper

https://online24h.biz/wp-admin/n/

exe.dropper

https://star-speed.vip/wp-admin/jp/

exe.dropper

https://kenhthietke.com/0Fg/

exe.dropper

https://syntegows.com/chirag/KX/

exe.dropper

https://vishalpatola.com/wp-admin/2/

exe.dropper

https://shmct.org/wp-admin/Xm/

Extracted

Language
ps1
Source
URLs
exe.dropper

http://account-creation.tvstartup.com/wp-content/themes/yMqhmRl/

exe.dropper

http://305.tvstartup.com/wp-content/hE2GpD/

exe.dropper

http://khuranaeyecarecentre.com/article/GQX1/

exe.dropper

http://esteticavaleria.com/wp-content/xmLGWWW/

exe.dropper

http://yashdemo.yashinfosystems.com/advpanel/OVTRE/

exe.dropper

http://eventswifiinternet.com/wp-content/E/

exe.dropper

http://opendoorsukraine.com/media/UvBoX8A/

Extracted

Language
ps1
Source
URLs
exe.dropper

https://shop.mtcss.co.uk/wp-admin/USQFPj/

exe.dropper

https://handfinger.com/wp-includes/iCY/

exe.dropper

http://hanulmotors.com/nbqso/8Tz/

exe.dropper

http://helpinghands4needy.org/wp-content/LgrI9g/

exe.dropper

http://www.ecobaratocanaria.com/wordpress/Jt/

exe.dropper

http://macerindia.com/wp-content/hRS/

exe.dropper

http://cfn.tvstartup.com/wp-content/7dNH1LI/

Extracted

Language
ps1
Source
URLs
exe.dropper

http://techiweek.com/wp-includes/FW6/

exe.dropper

https://ravi-tools.com/js/1/

exe.dropper

https://providedigital.com/wp-admin/Igvi3l/

exe.dropper

https://nghiencauca.com/wp-includes/BOInu4E/

exe.dropper

http://jietuo66.com/hwqsv/oC/

exe.dropper

https://oklatu.com/wp-admin/i/

exe.dropper

https://blog.thejobstack.com/pmloibg/M/

Extracted

Language
ps1
Source
URLs
exe.dropper

http://techinotebook.com/wp-includes/GTu/

exe.dropper

http://techisquare.com/blog/zFj/

exe.dropper

http://techinull.com/journal/euW/

exe.dropper

https://tvinstallationofatlanta.com/wp-includes/nMZ/

exe.dropper

https://krishnaoilindustries.com/wp-admin/545HlW/

exe.dropper

https://www.laoyebh.com/phpMyAdmin4.8.5/QY0T/

exe.dropper

https://shopdocauca.com/wp-includes/CKq8j/

Extracted

Language
ps1
Source
URLs
exe.dropper

https://trueteeshirt.com/wp-admin/5/

exe.dropper

https://nhaphomau.com/sa7/

exe.dropper

https://heck-electric.com/wp-includes/vUB/

exe.dropper

http://techinotification.com/wp-includes/ii1pd0x/

exe.dropper

http://editzarmy.com/journal/WinEA/

exe.dropper

https://noithatfhouse.com/wp-includes/g5JI21S/

exe.dropper

http://techitrends.com/wp-includes/qO/

Extracted

Language
ps1
Source
URLs
exe.dropper

https://youxel.com/sys-cache/lLWGgV/

exe.dropper

https://xiaomico.com/wp-content/Rs/

exe.dropper

http://onlynews24x7.com/5i1r62/cEsCCqC4li/

exe.dropper

http://blog.digikhata.com/denunciar/o2/

exe.dropper

http://test.qihchina.com/install/1b0IsII/

exe.dropper

http://www.saffronconsulting.in/wp-content/En/

exe.dropper

http://35.230.95.205/vxqhj/6U2gFiQPk/

Extracted

Language
ps1
Source
URLs
exe.dropper

http://www.cyclodeli.com/wp-admin/m/

exe.dropper

https://radiocristianalasvegas.com/wp-includes/wkA138w3S/

exe.dropper

http://skaosclub.com/wp-content/bUdvlTm9D/

exe.dropper

http://iniarsitek.com/wp-content/jkCz/

exe.dropper

https://vlcomercio.com.br/wp-includes/oef5i/

exe.dropper

http://www.yuryyulan.com/wp-includes/XPXi0L/

exe.dropper

http://creativeignite.com/wp-content/fnEhE/

Extracted

Language
ps1
Source
URLs
exe.dropper

https://www.sbobetmonte.com/wp-content/r5qS/

exe.dropper

http://www.kushalbharath.com/wp-content/WsD/

exe.dropper

http://dunion.ir/support/8USM0hcA4/

exe.dropper

https://storypostar.com/wp-admin/N/

exe.dropper

https://www.pixelstoryteller.com/wp-admin/kNz1g/

exe.dropper

http://www.tianhengdaojituan.com/wp-includes/JWocY/

exe.dropper

http://nb21.xyz/home/sIBOFci6/

Extracted

Language
ps1
Source
URLs
exe.dropper

http://parlayjudibola.com/wp-includes/X/

exe.dropper

http://freshandmorenp.com/wp-admin/images/bno7GT7Fy/

exe.dropper

http://dinapatrika.com/wp-admin/UYV7tM4WB/

exe.dropper

http://portal-ms.info/wp-includes/jjU55L/

exe.dropper

https://lapapeteria.at/wp-includes/XbtywFP/

exe.dropper

http://www.tycoonelevators.com/wp-content/T/

exe.dropper

http://daftarsitusjudibolaterpercaya.com/wp-includes/zO/

Extracted

Language
ps1
Source
URLs
exe.dropper

http://jubilantenterprise.com/wp-admin/Mj/

exe.dropper

http://brycebrumley.com/wp-admin/lj/

exe.dropper

http://aprendiendoganasdigital.com/wp-admin/r/

exe.dropper

http://mymorninglove.com/wp-admin/acv/

exe.dropper

http://shivam-aggarwal.com/cgi-bin/Zr/

exe.dropper

https://originalsalonqatar.com/wp-admin/lS0/

exe.dropper

http://aigtreyas.com/wp-content/p/

Extracted

Language
ps1
Source
URLs
exe.dropper

http://shop.qihchina.com/validators/8/

exe.dropper

http://skoolkam.com/blog/5ji/

exe.dropper

http://shopmebom.webdungsan.com/wp-admin/1Oy/

exe.dropper

http://demo77.webdungsan.com/wp-admin/6m/

exe.dropper

https://wyyichen.com/wp-includes/W0N/

exe.dropper

http://94.24.72.63/wp-content/te/

exe.dropper

http://topupez.info/wp-includes/DEr/

Extracted

Language
ps1
Source
URLs
exe.dropper

http://lblcomputacion.com/services/eY3/

exe.dropper

http://shop.homenhealthy.com/wp-includes/Ltj/

exe.dropper

http://raintoday.org/wp-admin/B/

exe.dropper

https://qualitychildcarepreschool.com/emqblk/m/

exe.dropper

https://www.tekadbatam.com/wp-content/Qq/

exe.dropper

https://boke.xiaoxiekeji.top/9a654zor/JnS/

exe.dropper

http://ys.xiaoxiekeji.top/wp-admin/uQY/

Targets

    • Target

      E1-20200928_221400

    • Size

      136KB

    • MD5

      5fa2b4dd277ef21fbdbab9b7a97b4652

    • SHA1

      dff5340070b7cbd47d853795f563519050aa0c13

    • SHA256

      165342a5aaa39fa2d3604b42e20248d5707ac17ba7e910455a13166712313542

    • SHA512

      f6be824006dbb9270e40290de2ecee31c4bbc50c661301732bddb54413240e5adba61aaff4ae72d7408dab660dc7779308d730feab00e389ca112a23ea59ca29

    • SSDEEP

      3072:oDW9ZcHT9yEgaLE47f4xlP83+ushr2i/K/x0:o8ZcB7Lp4X8DYL/+x0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Target

      E1-20200929_072700

    • Size

      149KB

    • MD5

      f5b60fd7527619e96054d85e7a331517

    • SHA1

      465237c15047ea094a19a8884de51151d4c5cff3

    • SHA256

      950e1826d1acdd8daba1b68f52bcae990b7df66b1fa6ad09e9ce8e65a83e84bf

    • SHA512

      1830d17f9c790f7bc7e1a3a1a3b44b3e26138ec3f4dd6a6f9a3ec31bd749614f14e4e630609bf4a99b91b9dc78c73879e2e4549343aafcb6be31af53acb30ed1

    • SSDEEP

      1536:TJVnK90GM9xuXFEr4Zx50zkGcclJvahtqf2HXiNL0CMdfFB6Oi:TfCMbu1Ty+crStXiNBUfFB6Oi

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Target

      E1-20200929_123100

    • Size

      169KB

    • MD5

      d2471082d81a3ab5c53bb279561e2223

    • SHA1

      3a0d4977c293ed24b954ce11b1ab2358209811d7

    • SHA256

      735040fdbf1b513dfe79b4c6485de58b176dba061ef76dd8a0cb42e8161551b4

    • SHA512

      e61365bc2042d9d7cd310df3fbf813483588eafe80d020d45ebeb2c6a3f89462385cd1ccd1d949ebf896a7fafc7b5e5f37d0936b0caa97dff584229a05f2d71c

    • SSDEEP

      3072:R9ufstRUUKSns8T00JSHUgteMJ8qMD7gZEFESXiNBaZxPIR:R9ufsfgIf0pLiFESXiNIZxQR

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Target

      E1-20200929_175200

    • Size

      102KB

    • MD5

      7fad816665b2645472e0cf6d06093d5c

    • SHA1

      9b8444fe1f83193a9965c5d5ec87646f5b68b972

    • SHA256

      3939481b8307ac66766600073b45ebd146e9675fdb765f31f650dca3290f91fa

    • SHA512

      df3ad913ec5761c0820915ed32b7a8ae3435a7456b7be1102728bab22d5892447e05aa4d0cebd144dd6db691ed7858929a9bbb02082d2fc154b8cf03d1bf763f

    • SSDEEP

      768:FQ6UUXZsPTX14VTL02vTf9fH1n6PT1Ms+0/qxYKTi9TwsRT/tr3wpdQ:4CVTLNTf9f5cTB+iq/sx/FAo

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Target

      E1-20200929_222900

    • Size

      144KB

    • MD5

      05fc099cd700b1f5f49da7110bf675ac

    • SHA1

      228b54e2e0eefb03ad833e75e744aa569e577f03

    • SHA256

      08c3a51969b9ccfcd46ad14ef1a7599a798c21e693a582ac6d8f449f77f4fc09

    • SHA512

      0e20f84a0326b1a1c714312072bc5757dab94dfaa2cd6b5ff9e7f60e6308268611786d677e6e2ec744ad9fe86ae4adbb34a4d7e802f5644b58c868d92526669d

    • SSDEEP

      1536:hMRD3bNqfNpu39IId5a6XP3Mg8af2qf9ieW0jnzJ:CR1qf69xak3Mgx2sVjnzJ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Target

      E2-20200929_041700

    • Size

      133KB

    • MD5

      9c358ef519ba4a1542b6642ef755b40e

    • SHA1

      72635a3cf84a8e5b100fe16e6499efea93eb6240

    • SHA256

      15d3403b8d1d07b8b635e79f0fd458c3961ef5b48d60d19b6596c9c1028a2662

    • SHA512

      f749b348c6515233cfbf472e531c2f18adeaf58f2edb55e6a0bc400c8ab4dae4bdf69b80bea4b756aa98b81fa6aaf5c4342666a1c97eb4b5cdd903b5f947b71a

    • SSDEEP

      1536:LA2RD3bNqfNpu39IId5a6XP3Mg8afSqCVyzwyQUpsJNw:VR1qf69xak3MgxS/EzwyQisJNw

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

    • Target

      E2-20200929_090800

    • Size

      142KB

    • MD5

      1d3df46a7f6af9269c556c5daa38481a

    • SHA1

      05888c5a40ee657673c0ba668f6c8a6873e8cf1d

    • SHA256

      f5013fbc3f4e685f68f19711624f55a63fc7ff5dfa0005f8c16803761c7d2788

    • SHA512

      d8a9686cf81ce8c6b78594b432abd8098418b8248a007516e25ce1c45fe79f329bea702906fa1cde43ab8467ea4ae35d61a5b9b1fc7e1649393ed68e25de52dd

    • SSDEEP

      1536:ALRD3bNqfNpu39IId5a6XP3Mg8afCquVoF3Cgar3Pd0MZXiNjLoob:8R1qf69xak3MgxCLoMFr3Pd0MZXiNPvb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Target

      E2-20200929_131800

    • Size

      189KB

    • MD5

      1c9581bba07a6b44af152d88143df41f

    • SHA1

      53b6d0e69dafc40e57e39cc38aedbee6c9c7fce2

    • SHA256

      a1ff4c3cc94952016f96e7696b9d0eff572e92076bc8f88bab00ff2dc752a676

    • SHA512

      ae628bfaea788e796f7daa016f53fb5d6c873590bf936be149fc914ead4148b609491d07183f58a42d579451e387d6240cf7ea5e277fe4bddc9a32fdbfc7976d

    • SSDEEP

      3072:dA9ov+mLIX7wzt0HHDnwjacRHvvvvZ18gEmX:Sat0TwDR38gEmX

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Target

      E2-20200929_175500

    • Size

      167KB

    • MD5

      682c15e81aacde23d75af1ccd402833a

    • SHA1

      afbb1e24cbebe7491474baef68275a0b9dd4168a

    • SHA256

      960255acf6a199c3b1b388d617e12d03d1d2e8d8281c31263ce5afacb186f37b

    • SHA512

      5efe6c81f65916151211bd7cc28a7afdc4c37e32c3063d08eabea85caf8a11346fe7e00cbc62ba356581d6fac78c384f55c6f5e3f8cbdba7dd6f0304ede080e7

    • SSDEEP

      1536:lI7OxDiGmrYL7+chKas7V7tq9jD4RuqM1Ve/qkD4ksjT6T9p:674iH8Zcag7tWLy/9DHsI9p

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Target

      E2-20200929_221200

    • Size

      130KB

    • MD5

      f4d94fe27c343894012a3c3ff9269c14

    • SHA1

      d37969e710474ef8cfac6552c42c5c8a245ea1e3

    • SHA256

      a7bac9b6662da2eb4c3fa6f12c10d790ab6b8ef1735241fcd2a4d35a152a8965

    • SHA512

      350b2dd5768d8184526e06b0fa4abfb1526a25010a25969b96833bb323774383812c47388d65a7a6af63e7ed29199d6d85fab698793f13357aa3a855bf01d92e

    • SSDEEP

      1536:TNVLAAAAcAAAAAUmPxwMddylbvuNm9F96qpQWAfjlyqV:TLAAAAcAAAAAUSxRYs4mLlyqV

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Target

      E3-20200929_082900

    • Size

      136KB

    • MD5

      489b3a76f798e7edcd1a586ffa0aea72

    • SHA1

      67ecbb08b776e141a5925cd7573bfcffd3aeb3d2

    • SHA256

      87bbfe64cf6bdc59bfd1cbd5c157c192232ab21203ae46a94e16f0037307a83d

    • SHA512

      240c67e769691193b53094eae628d7252e619448dd2bd6b69d536891cdfa60b805a7a6067e486b68471a1fbf61a1e9d99d6c10f953a267909dfc639d41a4e8ca

    • SSDEEP

      1536:iSFvW9P9QuiPfRD3bNqfNpu39IId5a6XP3Mg8af2qocfFXiNqHs6KXJPHNlK:iS3R1qf69xak3Mgx2ytXiNGs6wJPHNlK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Target

      E3-20200929_200000

    • Size

      170KB

    • MD5

      342e167fec542940a45d557ad0c2a957

    • SHA1

      9d2010b03ebdcc0c0e619e42ee4f9e156b56e72c

    • SHA256

      088d3fddb3c0dbb04979bbb194eefdf0cd9c0be2c4f5d9986c437efba2830ba0

    • SHA512

      47f91199b8444e6477d1c5b75b76b1078f30bcddcac60b7c046c21a37f822fbc1d0a5ddaffa7528594367ac259d5935cc152cfe9c9578b4442d20051fe214925

    • SSDEEP

      1536:i67OxDiGmrYL7+chKas7V7tq9jD4RuqM1VeNqQigvwAD/IHz:j74iH8Zcag7tWLyN9igYA7IT

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Target

      E3-20200929_222100

    • Size

      150KB

    • MD5

      6b3290c1a91c54cc0a16b30a533e7fe3

    • SHA1

      951cb8535ed8f79e2d6e7adddb90763966498303

    • SHA256

      cc309254f3cdd186551c54c300edb3ef4643447a39ab2c10fe91a33a84b45979

    • SHA512

      2a445db2b08163e90e9cc0dea6d55ec765f49e4dd4a853844eb46d1ddd0f98cf9a3857cadfcd90e6801caaa8cf35c350fd3e741a93919af1efdb795ac32d6a35

    • SSDEEP

      3072:+DW9ZcHT9yEgaLE47f4xlP83+lq8GtqzAR:+8ZcB7Lp4X807GoAR

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

    • Target

      E3-20200929_222700

    • Size

      162KB

    • MD5

      7b5ed510de3ba8db75bf56669a1c6473

    • SHA1

      17356eeb60b192d4442367a6fa9c37f6d9d71c8f

    • SHA256

      5010ca9fb0cb2d11acdcd32f8a6d368bb3f783a20e5290bca52d252bd814aa49

    • SHA512

      db1423c28a9c4fe6726b3852dbab60bfb4dfd2574d4f38f08225c8698ae30a656c5abe53c2931402eaea667f5493f5b0443ac600af255c7f9169f1900e4082b3

    • SSDEEP

      1536:I/7iQQsfDqOxqr7OxDiGmrYL7+chKas7V7tq9jD4RuqM1VetqjpsSoUlM:ImQbfrUr74iH8Zcag7tWLytypHlM

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks

static1

Score
1/10

behavioral1

discovery
Score
10/10

behavioral2

Score
10/10

behavioral3

discovery
Score
10/10

behavioral4

Score
10/10

behavioral5

discovery
Score
10/10

behavioral6

Score
10/10

behavioral7

discovery
Score
10/10

behavioral8

Score
10/10

behavioral9

discovery
Score
10/10

behavioral10

Score
10/10

behavioral11

discovery
Score
10/10

behavioral12

Score
10/10

behavioral13

discovery
Score
10/10

behavioral14

Score
10/10

behavioral15

discovery
Score
10/10

behavioral16

Score
10/10

behavioral17

discovery
Score
10/10

behavioral18

Score
10/10

behavioral19

discovery
Score
10/10

behavioral20

Score
10/10

behavioral21

discovery
Score
10/10

behavioral22

Score
10/10

behavioral23

discovery
Score
10/10

behavioral24

Score
10/10

behavioral25

discovery
Score
10/10

behavioral26

Score
6/10

behavioral27

discovery
Score
10/10

behavioral28

Score
10/10