General

  • Target

    SecuriteInfo.com.DOC.Kryptik.Q.4317

  • Size

    302KB

  • Sample

    200713-4tqkgvhn96

  • MD5

    37e08da7efc7124d242a227a31509e89

  • SHA1

    2b7103a7f8b0c3e0add04401f91164306a885746

  • SHA256

    23b67ca98a25fffdca4e8d542a5bbfa69110d0ca07548b219eed5948f79db801

  • SHA512

    690a9c7ee7afb2c54b0ccab8605dea81d3d2b59b89030526e16c5e403f201101cdc8bb0272cdcdaa0864e8cceae0d397e989d576194a6b12f15a703105c45f38

Score
10/10

Malware Config

Targets

    • Target

      SecuriteInfo.com.DOC.Kryptik.Q.4317

    • Size

      302KB

    • MD5

      37e08da7efc7124d242a227a31509e89

    • SHA1

      2b7103a7f8b0c3e0add04401f91164306a885746

    • SHA256

      23b67ca98a25fffdca4e8d542a5bbfa69110d0ca07548b219eed5948f79db801

    • SHA512

      690a9c7ee7afb2c54b0ccab8605dea81d3d2b59b89030526e16c5e403f201101cdc8bb0272cdcdaa0864e8cceae0d397e989d576194a6b12f15a703105c45f38

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Enumerates connected drives

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Enterprise v6

Tasks