Resubmissions

14-01-2021 11:54

210114-7xa6tfh59x 10

14-01-2021 11:48

210114-q634htvf9a 10

14-01-2021 01:32

210114-d1g1zn1d22 8

General

  • Target

    sample1.bin

  • Size

    830KB

  • Sample

    210114-7xa6tfh59x

  • MD5

    7dbd8ecfada1d39a81a58c9468b91039

  • SHA1

    0d21e2742204d1f98f6fcabe0544570fd6857dd3

  • SHA256

    dc40e48d2eb0e57cd16b1792bdccc185440f632783c7bcc87c955e1d4e88fc95

  • SHA512

    a851ac80b43ebdb8e990c2eb3daabb456516fc40bb43c9f76d0112674dbd6264efce881520744f0502f2962fc0bb4024e7d73ea66d56bc87c0cc6dfde2ab869a

Score
10/10

Malware Config

Targets

    • Target

      sample1.bin

    • Size

      830KB

    • MD5

      7dbd8ecfada1d39a81a58c9468b91039

    • SHA1

      0d21e2742204d1f98f6fcabe0544570fd6857dd3

    • SHA256

      dc40e48d2eb0e57cd16b1792bdccc185440f632783c7bcc87c955e1d4e88fc95

    • SHA512

      a851ac80b43ebdb8e990c2eb3daabb456516fc40bb43c9f76d0112674dbd6264efce881520744f0502f2962fc0bb4024e7d73ea66d56bc87c0cc6dfde2ab869a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Tasks