General

  • Target

    5740937465331712.zip

  • Size

    50KB

  • Sample

    210305-2tfeg79yes

  • MD5

    ef9925def70f3d3b157d16eacbf09d98

  • SHA1

    ac5057ed58e513ec5731abc8945d5a22ac82e96d

  • SHA256

    850fcdf5c86123c672bf8572c6a06ddbedf256bfbb7236c3886e1f6f4cc96d16

  • SHA512

    37404c68ea801e84a1280247554a95faf1673aca63b99535e8ac170c63dd8c58b2ceb2ed7d8802e125407395519d0a4625adfff71622f778e407e4fda89e66de

Score
10/10

Malware Config

Targets

    • Target

      a9194b2dc593c73598cc95b3b1aad400910f48225e527dc61159300be44651ca

    • Size

      141KB

    • MD5

      53f09cdb89620ee0d02c006d5bdf758f

    • SHA1

      caf1ff6f5563d23eac7c547f2309c0608ae3029f

    • SHA256

      a9194b2dc593c73598cc95b3b1aad400910f48225e527dc61159300be44651ca

    • SHA512

      60374ee268f24ce193c860caf5ccf779a94388f44923bf2ecd5ba3273dfe937c4d8f960cdd906f56eccd39a81623636a2b07c22f116de8f1ee48cbe5f89b8a94

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks