General

  • Target

    6a.zip

  • Size

    57KB

  • Sample

    210506-dlcqve6kss

  • MD5

    de25477b5950517afe3082976296db1b

  • SHA1

    0004db3eff46eec7a47b8a2777131eaeb51a5f87

  • SHA256

    f8c6ecaf93b8d88b8bb6f4f495e348c443667361b2c622739daf1c6c6463b46d

  • SHA512

    68adec20503d397aa21dd142b2a2533cabf48c56051fae43fe85efed920c20769efaf13c2c83688ef56546980ebe26343feb32cce74b833abeef03773b267684

Score
10/10

Malware Config

Targets

    • Target

      8fb8f5687af81aaec01a26a0875ee8ce3915a9f7efd354c80ea8f7686aa913ae.bin

    • Size

      75KB

    • MD5

      66f514b9b216db3250f012599f4da6df

    • SHA1

      991602aa8cf1c393b19997d6eb7becd126d432d1

    • SHA256

      8fb8f5687af81aaec01a26a0875ee8ce3915a9f7efd354c80ea8f7686aa913ae

    • SHA512

      fb3667c4edf47a46a596035f1577fb75c415c018b670ea14c7c21518cb938d95a08d996719f43ad096f35b0374decb6157fff9025a0a7a6c2a79e77ed84714ba

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks