General

  • Target

    7f97e6d6337b217ab428de65fc72652be1c739c0ba34b9ef1f629ec823131254

  • Size

    54KB

  • Sample

    210114-mkc4gazltx

  • MD5

    f7afd1f5e34da090a6175737c622b853

  • SHA1

    c22a9a3ff849f1f9f4542d3dd4b3b0a3ed5054fa

  • SHA256

    7f97e6d6337b217ab428de65fc72652be1c739c0ba34b9ef1f629ec823131254

  • SHA512

    29ffcfa34862a4b4c042cfdcc73289b515420744537bf21d4de7a417a55aece70ea3675d9805b0cec81eab8fb82a162193ffd94bc972fac31627e7f02875baee

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      7f97e6d6337b217ab428de65fc72652be1c739c0ba34b9ef1f629ec823131254

    • Size

      54KB

    • MD5

      f7afd1f5e34da090a6175737c622b853

    • SHA1

      c22a9a3ff849f1f9f4542d3dd4b3b0a3ed5054fa

    • SHA256

      7f97e6d6337b217ab428de65fc72652be1c739c0ba34b9ef1f629ec823131254

    • SHA512

      29ffcfa34862a4b4c042cfdcc73289b515420744537bf21d4de7a417a55aece70ea3675d9805b0cec81eab8fb82a162193ffd94bc972fac31627e7f02875baee

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks