General

  • Target

    b7233384574bb22afe5b463083228ad6e9d2cd12db7107f98fc37de8f252d389

  • Size

    85KB

  • Sample

    210722-tt34346f7x

  • MD5

    cba5c5b53439f062b9edf4577967958d

  • SHA1

    c9e80b86f80d5e14187d1b72f89da9ad1397c4e5

  • SHA256

    b7233384574bb22afe5b463083228ad6e9d2cd12db7107f98fc37de8f252d389

  • SHA512

    88f14094f68fcda91583c2d8ea93c8dc03209b0a0088c146c3e56033792b40750cc60f591a7702a200ac59ba88a05e4146c63f7e86a2f60f34548de674c687b0

Score
10/10

Malware Config

Targets

    • Target

      b7233384574bb22afe5b463083228ad6e9d2cd12db7107f98fc37de8f252d389

    • Size

      85KB

    • MD5

      cba5c5b53439f062b9edf4577967958d

    • SHA1

      c9e80b86f80d5e14187d1b72f89da9ad1397c4e5

    • SHA256

      b7233384574bb22afe5b463083228ad6e9d2cd12db7107f98fc37de8f252d389

    • SHA512

      88f14094f68fcda91583c2d8ea93c8dc03209b0a0088c146c3e56033792b40750cc60f591a7702a200ac59ba88a05e4146c63f7e86a2f60f34548de674c687b0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks