General

  • Target

    SecuriteInfo.com.VB.Heur2.EmoDldr.16.13971CEE.Gen.7989.21486

  • Size

    244KB

  • Sample

    210309-xgc3fj4bas

  • MD5

    465073cff94c47ab863e5e9a5822c35d

  • SHA1

    be9cb1aa91056bbb4d9b8ad82b43ffdb85dbe36a

  • SHA256

    749f0d02e40de3105c7086ae9073dd71ea494ab873cc1b32bc4ae25ac72d892e

  • SHA512

    d11e4095a55b7388635b7eaf0bba3295a7d70ffa9d57b255ba97244c63952aa802adf95cf4fad6c44530b8c83cd2def1959ff4a7b722bbc27a170e3c187df650

Score
10/10

Malware Config

Targets

    • Target

      SecuriteInfo.com.VB.Heur2.EmoDldr.16.13971CEE.Gen.7989.21486

    • Size

      244KB

    • MD5

      465073cff94c47ab863e5e9a5822c35d

    • SHA1

      be9cb1aa91056bbb4d9b8ad82b43ffdb85dbe36a

    • SHA256

      749f0d02e40de3105c7086ae9073dd71ea494ab873cc1b32bc4ae25ac72d892e

    • SHA512

      d11e4095a55b7388635b7eaf0bba3295a7d70ffa9d57b255ba97244c63952aa802adf95cf4fad6c44530b8c83cd2def1959ff4a7b722bbc27a170e3c187df650

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks