General

  • Target

    306b49ee2d7c8b286e5ff5334c84352d2d7fa39681f4f5349026cb1d1dbf9366

  • Size

    140KB

  • Sample

    210721-43ksl962en

  • MD5

    6bf05c7bf2922c92b590ccd9f81adead

  • SHA1

    80e46189cde0ffa29e0b587a4fa23a826a260048

  • SHA256

    306b49ee2d7c8b286e5ff5334c84352d2d7fa39681f4f5349026cb1d1dbf9366

  • SHA512

    0edad497446975d976ffd98c1cd0ad2c3f64c84910721669e49cc9ba08b9d7c0862759146603654e14f07b48991e0d33168f07a234369c253507caf000c14985

Score
10/10

Malware Config

Targets

    • Target

      306b49ee2d7c8b286e5ff5334c84352d2d7fa39681f4f5349026cb1d1dbf9366

    • Size

      140KB

    • MD5

      6bf05c7bf2922c92b590ccd9f81adead

    • SHA1

      80e46189cde0ffa29e0b587a4fa23a826a260048

    • SHA256

      306b49ee2d7c8b286e5ff5334c84352d2d7fa39681f4f5349026cb1d1dbf9366

    • SHA512

      0edad497446975d976ffd98c1cd0ad2c3f64c84910721669e49cc9ba08b9d7c0862759146603654e14f07b48991e0d33168f07a234369c253507caf000c14985

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks