General

  • Target

    a04f4de848a5b5ef49f1bd832d1075a1ec4ef79c1e4d4bb6bf09440ab35cc409

  • Size

    82KB

  • Sample

    201104-qbqnj7rp9s

  • MD5

    927f4030acef0cff79aa8b1766906708

  • SHA1

    f26884a3fb2d7bff8e0e8b6c289d5d7b3d1e26e9

  • SHA256

    a04f4de848a5b5ef49f1bd832d1075a1ec4ef79c1e4d4bb6bf09440ab35cc409

  • SHA512

    de1b423d0dbc10172d8e9229fafd4e3011e056aaecf5b12b440250b256fb8cba960265d0f5aaa705e6dd8c5a01be3d60c8928d9d536c12f2c2454f3eaf6a431b

Score
10/10

Malware Config

Targets

    • Target

      a04f4de848a5b5ef49f1bd832d1075a1ec4ef79c1e4d4bb6bf09440ab35cc409

    • Size

      82KB

    • MD5

      927f4030acef0cff79aa8b1766906708

    • SHA1

      f26884a3fb2d7bff8e0e8b6c289d5d7b3d1e26e9

    • SHA256

      a04f4de848a5b5ef49f1bd832d1075a1ec4ef79c1e4d4bb6bf09440ab35cc409

    • SHA512

      de1b423d0dbc10172d8e9229fafd4e3011e056aaecf5b12b440250b256fb8cba960265d0f5aaa705e6dd8c5a01be3d60c8928d9d536c12f2c2454f3eaf6a431b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blacklisted process makes network request

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks