General

  • Target

    Order #30297.pps

  • Size

    380KB

  • Sample

    210226-2xak3md6b2

  • MD5

    d243c062dfd6ddf2f1c30311a72414a7

  • SHA1

    b437ca1859aa40d5c3faae79dac6d2128c766d9d

  • SHA256

    d0a1b07edf45ba875c1e2923c92f374e2e65bd978b5e56ece588abd52add7105

  • SHA512

    9896f01d755cc526bc7ad364ca1bcc4259d4be6a8cb7e754ba941459bbe3e6b51e0e94deef0d656b35c50f1332a67ec797d6326471cc5edc483e706a022296f3

Score
10/10

Malware Config

Targets

    • Target

      Order #30297.pps

    • Size

      380KB

    • MD5

      d243c062dfd6ddf2f1c30311a72414a7

    • SHA1

      b437ca1859aa40d5c3faae79dac6d2128c766d9d

    • SHA256

      d0a1b07edf45ba875c1e2923c92f374e2e65bd978b5e56ece588abd52add7105

    • SHA512

      9896f01d755cc526bc7ad364ca1bcc4259d4be6a8cb7e754ba941459bbe3e6b51e0e94deef0d656b35c50f1332a67ec797d6326471cc5edc483e706a022296f3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks