General

  • Target

    30bd80d57fe0b8bfeabc34dc3bb3b12b6741e6ee3bc4a74adb586e2939ef1f74

  • Size

    46KB

  • Sample

    210315-cq9hqkhcm6

  • MD5

    580afece57c22de1717921473c03e1a7

  • SHA1

    5cbd73d78239dc355634f35abe63c7e76969a9b8

  • SHA256

    30bd80d57fe0b8bfeabc34dc3bb3b12b6741e6ee3bc4a74adb586e2939ef1f74

  • SHA512

    88c19a155154ed6b16da98e4351476656746f4c01f415130076fecf64e070d7d0940ced5fb33c3cc5f649abebc0c7f6547f31d67d97f291804e65de340840dc3

Score
10/10

Malware Config

Targets

    • Target

      30bd80d57fe0b8bfeabc34dc3bb3b12b6741e6ee3bc4a74adb586e2939ef1f74

    • Size

      46KB

    • MD5

      580afece57c22de1717921473c03e1a7

    • SHA1

      5cbd73d78239dc355634f35abe63c7e76969a9b8

    • SHA256

      30bd80d57fe0b8bfeabc34dc3bb3b12b6741e6ee3bc4a74adb586e2939ef1f74

    • SHA512

      88c19a155154ed6b16da98e4351476656746f4c01f415130076fecf64e070d7d0940ced5fb33c3cc5f649abebc0c7f6547f31d67d97f291804e65de340840dc3

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks