General

  • Target

    569d5acb6b3ef16b4cfaf7775c73e26d6ae6b969eb6ba06b361899bec0567127

  • Size

    142KB

  • Sample

    210114-shzvlnfpjx

  • MD5

    5f189133074a059eee84971a0eddd769

  • SHA1

    7627c5fe8a7503805cc24d210e16118ab9be0bce

  • SHA256

    569d5acb6b3ef16b4cfaf7775c73e26d6ae6b969eb6ba06b361899bec0567127

  • SHA512

    9dc2e1746941bfeb65d0c63c12a478e8905c236b44ca9e22a9edee4bbe361f7f7dd22eff5a771721058a9200e1a1012a86288313059f6bbf271502602c89d9fd

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      569d5acb6b3ef16b4cfaf7775c73e26d6ae6b969eb6ba06b361899bec0567127

    • Size

      142KB

    • MD5

      5f189133074a059eee84971a0eddd769

    • SHA1

      7627c5fe8a7503805cc24d210e16118ab9be0bce

    • SHA256

      569d5acb6b3ef16b4cfaf7775c73e26d6ae6b969eb6ba06b361899bec0567127

    • SHA512

      9dc2e1746941bfeb65d0c63c12a478e8905c236b44ca9e22a9edee4bbe361f7f7dd22eff5a771721058a9200e1a1012a86288313059f6bbf271502602c89d9fd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks