General

  • Target

    SecuriteInfo.com.DOC.Kryptik.Q.21545

  • Size

    311KB

  • Sample

    200713-hnwc4et6p6

  • MD5

    780c65f9799fabd4b736165bc5785eeb

  • SHA1

    0a510a166031402b2ca98be6c406a9e8914afb43

  • SHA256

    dc999f91abf8dc03db424fb8bed91876c06cafa4da8d1d303595328361be9d26

  • SHA512

    f5721b5353929f231822b9d367e28b6c865b66f93e373cddd23079bdfb2faa1049282c5ec4adfe988a1c8f3992033f3db74665d633915de7336ba9178f83a977

Score
10/10

Malware Config

Targets

    • Target

      SecuriteInfo.com.DOC.Kryptik.Q.21545

    • Size

      311KB

    • MD5

      780c65f9799fabd4b736165bc5785eeb

    • SHA1

      0a510a166031402b2ca98be6c406a9e8914afb43

    • SHA256

      dc999f91abf8dc03db424fb8bed91876c06cafa4da8d1d303595328361be9d26

    • SHA512

      f5721b5353929f231822b9d367e28b6c865b66f93e373cddd23079bdfb2faa1049282c5ec4adfe988a1c8f3992033f3db74665d633915de7336ba9178f83a977

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Enumerates connected drives

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Enterprise v6

Tasks