General

  • Target

    82d0b5b83d9fa55b57bdcd92f636e48ac7c44303a366be96279d6402bab34257

  • Size

    54KB

  • Sample

    210114-pj5bdqdcfn

  • MD5

    12ff01a186adb0427ed0683831d3f7a1

  • SHA1

    d0ce240201c8ba8442e7fafc35f2ee4aa180682d

  • SHA256

    82d0b5b83d9fa55b57bdcd92f636e48ac7c44303a366be96279d6402bab34257

  • SHA512

    235312cf6c84a85ed91ea4246a3e181ec3151a3857845d8a5b579ed62074554697e1251e8b1f44151ad11cc85942f79e195a5bf7145fa8cbe96c4a3b01e05ae2

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      82d0b5b83d9fa55b57bdcd92f636e48ac7c44303a366be96279d6402bab34257

    • Size

      54KB

    • MD5

      12ff01a186adb0427ed0683831d3f7a1

    • SHA1

      d0ce240201c8ba8442e7fafc35f2ee4aa180682d

    • SHA256

      82d0b5b83d9fa55b57bdcd92f636e48ac7c44303a366be96279d6402bab34257

    • SHA512

      235312cf6c84a85ed91ea4246a3e181ec3151a3857845d8a5b579ed62074554697e1251e8b1f44151ad11cc85942f79e195a5bf7145fa8cbe96c4a3b01e05ae2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks