General

  • Target

    55fd7bf4246338d1c8c8146ab23d51c7ae7025a33c281779baa3e0c6f934139d

  • Size

    37KB

  • Sample

    210722-8dmegwqhta

  • MD5

    6d03789dc6e7a80cf274bdcce34faf7d

  • SHA1

    2d310960a80eec96d9131a01703c0b53d7513cb5

  • SHA256

    55fd7bf4246338d1c8c8146ab23d51c7ae7025a33c281779baa3e0c6f934139d

  • SHA512

    0d51720e440f591c4c6eadf2882283b5515f9b947514750f5b91c3a26666d4a6321d42c342931ebebd7121627ca96ce7d78e6094eea89243fedf21e2fe3fed96

Score
10/10

Malware Config

Targets

    • Target

      55fd7bf4246338d1c8c8146ab23d51c7ae7025a33c281779baa3e0c6f934139d

    • Size

      37KB

    • MD5

      6d03789dc6e7a80cf274bdcce34faf7d

    • SHA1

      2d310960a80eec96d9131a01703c0b53d7513cb5

    • SHA256

      55fd7bf4246338d1c8c8146ab23d51c7ae7025a33c281779baa3e0c6f934139d

    • SHA512

      0d51720e440f591c4c6eadf2882283b5515f9b947514750f5b91c3a26666d4a6321d42c342931ebebd7121627ca96ce7d78e6094eea89243fedf21e2fe3fed96

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks