General

  • Target

    210468bf9c97e5bbae46e464625550d20079fb3766ad33d490f06e0cd037163a

  • Size

    54KB

  • Sample

    210114-c5dv82bbx6

  • MD5

    0ab5d82db3541b40b3ef56d03efe8a3f

  • SHA1

    e44e018503f87fa50b1ad1e7e56a3f4a3b56eff9

  • SHA256

    210468bf9c97e5bbae46e464625550d20079fb3766ad33d490f06e0cd037163a

  • SHA512

    2824970bfa09450f8266274e4da423b0c418289b033842402959886a8514d4564620a83b82af5217be88eeb088621826f816e0fa320b3c0a11dfc8493eaae1fa

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      210468bf9c97e5bbae46e464625550d20079fb3766ad33d490f06e0cd037163a

    • Size

      54KB

    • MD5

      0ab5d82db3541b40b3ef56d03efe8a3f

    • SHA1

      e44e018503f87fa50b1ad1e7e56a3f4a3b56eff9

    • SHA256

      210468bf9c97e5bbae46e464625550d20079fb3766ad33d490f06e0cd037163a

    • SHA512

      2824970bfa09450f8266274e4da423b0c418289b033842402959886a8514d4564620a83b82af5217be88eeb088621826f816e0fa320b3c0a11dfc8493eaae1fa

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks