General

  • Target

    9173221a937cf1ef14a7fcb5ee89c87162aaf60b6b901405827f43b1871d693b

  • Size

    85KB

  • Sample

    210721-svzwkpyeej

  • MD5

    774c9db0d6227c94806074555e42db67

  • SHA1

    071a3ce6e2fc5e2088bed0ad8bacb6ba71ab31ce

  • SHA256

    9173221a937cf1ef14a7fcb5ee89c87162aaf60b6b901405827f43b1871d693b

  • SHA512

    7cfb01b260b183476a81121ff63053ecf5b93ac1ac345055aefc3c6e4b8def5545f854ca0d0198cf2124dc6fa87fd09eef3b8478672a1e148e12d2ff0476a15b

Score
10/10

Malware Config

Targets

    • Target

      9173221a937cf1ef14a7fcb5ee89c87162aaf60b6b901405827f43b1871d693b

    • Size

      85KB

    • MD5

      774c9db0d6227c94806074555e42db67

    • SHA1

      071a3ce6e2fc5e2088bed0ad8bacb6ba71ab31ce

    • SHA256

      9173221a937cf1ef14a7fcb5ee89c87162aaf60b6b901405827f43b1871d693b

    • SHA512

      7cfb01b260b183476a81121ff63053ecf5b93ac1ac345055aefc3c6e4b8def5545f854ca0d0198cf2124dc6fa87fd09eef3b8478672a1e148e12d2ff0476a15b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks