General

  • Target

    c054c37a0fa13829f20dd9a09fb48f18a5c4130fe228bd44cb80cb2b9e75770b

  • Size

    141KB

  • Sample

    210315-t6rayeke9e

  • MD5

    99316a73d5c6ac92cdfb661e6bc7599b

  • SHA1

    008cf4db97ed11555a8961130ee7666a75ebc0c3

  • SHA256

    c054c37a0fa13829f20dd9a09fb48f18a5c4130fe228bd44cb80cb2b9e75770b

  • SHA512

    5cf7710491a9494699f5601680e41468242578e955f1609987e5cc821eef692e2e4ae9c0128e2eebefb13697eeebb47f73ad02faa61e78dbcb65104a360cae36

Score
10/10

Malware Config

Targets

    • Target

      c054c37a0fa13829f20dd9a09fb48f18a5c4130fe228bd44cb80cb2b9e75770b

    • Size

      141KB

    • MD5

      99316a73d5c6ac92cdfb661e6bc7599b

    • SHA1

      008cf4db97ed11555a8961130ee7666a75ebc0c3

    • SHA256

      c054c37a0fa13829f20dd9a09fb48f18a5c4130fe228bd44cb80cb2b9e75770b

    • SHA512

      5cf7710491a9494699f5601680e41468242578e955f1609987e5cc821eef692e2e4ae9c0128e2eebefb13697eeebb47f73ad02faa61e78dbcb65104a360cae36

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks