General

  • Target

    d2205caf_by_Libranalysis

  • Size

    79KB

  • Sample

    210507-dr5qckgqxj

  • MD5

    d2205caf12798214ae649079c67f9122

  • SHA1

    d773c0f28feb0d049effb412492e414a9ad5384c

  • SHA256

    ccdda1c9f6177f3bf1b0f887550a961c811f02242dbd512ec2fe30d2f9cf73e4

  • SHA512

    e43ccbbdbf9366df32ca0beeb47673d5575033f83058ca0b2e1976d4bcfa8ea4ebe3f3ee6c5453862a8c13b8b733a085ae6c15b660d3f51b6939e53c3baeda1b

Score
10/10

Malware Config

Targets

    • Target

      d2205caf_by_Libranalysis

    • Size

      79KB

    • MD5

      d2205caf12798214ae649079c67f9122

    • SHA1

      d773c0f28feb0d049effb412492e414a9ad5384c

    • SHA256

      ccdda1c9f6177f3bf1b0f887550a961c811f02242dbd512ec2fe30d2f9cf73e4

    • SHA512

      e43ccbbdbf9366df32ca0beeb47673d5575033f83058ca0b2e1976d4bcfa8ea4ebe3f3ee6c5453862a8c13b8b733a085ae6c15b660d3f51b6939e53c3baeda1b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks