General

  • Target

    a60f00b0_by_Libranalysis

  • Size

    79KB

  • Sample

    210505-c4jar6x1va

  • MD5

    a60f00b085daf1454fc229164be49862

  • SHA1

    71adf78e05ff5af07d9dd6154c1ea0695a013eb6

  • SHA256

    21905e3b19ea3c56637b8c5315cbe422c78d7d8fa48ff6358057b305e748cbfb

  • SHA512

    5194f26b1428ba7de66682bf9907c303024faed51797e8d6f4aefe0daf5b8a78727777930e00c1bed015477a4195f9d12cf84de320c7905596e99c17960394f8

Score
10/10

Malware Config

Targets

    • Target

      a60f00b0_by_Libranalysis

    • Size

      79KB

    • MD5

      a60f00b085daf1454fc229164be49862

    • SHA1

      71adf78e05ff5af07d9dd6154c1ea0695a013eb6

    • SHA256

      21905e3b19ea3c56637b8c5315cbe422c78d7d8fa48ff6358057b305e748cbfb

    • SHA512

      5194f26b1428ba7de66682bf9907c303024faed51797e8d6f4aefe0daf5b8a78727777930e00c1bed015477a4195f9d12cf84de320c7905596e99c17960394f8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks