General

  • Target

    e847997f0901714a38c9e484a895db2fac80cb34634db3c8ab769d593c6b2a11

  • Size

    54KB

  • Sample

    210114-zwrxf4hscs

  • MD5

    71722c4f9794fe1f6b97cad66fc6a37b

  • SHA1

    c849af63e5830dc6107b11095cb6eb73db24daec

  • SHA256

    e847997f0901714a38c9e484a895db2fac80cb34634db3c8ab769d593c6b2a11

  • SHA512

    a1d881d2503a7503bbce2e33eaa4312bf5cff0c6161fe4901b065031c5a00697fd375ae8b96add943c0ab674ebddbced512bdbab2eb39df1eadbf389c2189528

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      e847997f0901714a38c9e484a895db2fac80cb34634db3c8ab769d593c6b2a11

    • Size

      54KB

    • MD5

      71722c4f9794fe1f6b97cad66fc6a37b

    • SHA1

      c849af63e5830dc6107b11095cb6eb73db24daec

    • SHA256

      e847997f0901714a38c9e484a895db2fac80cb34634db3c8ab769d593c6b2a11

    • SHA512

      a1d881d2503a7503bbce2e33eaa4312bf5cff0c6161fe4901b065031c5a00697fd375ae8b96add943c0ab674ebddbced512bdbab2eb39df1eadbf389c2189528

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks