General

  • Target

    576846688affd1beddef344a080b78728e8d649c6f75068899cde008fa501d83

  • Size

    140KB

  • Sample

    210726-71btfant4x

  • MD5

    a9a0fed71fb7d2c87d0573c2ef58a965

  • SHA1

    c4f1ec24d582759c4429df2a4a8c161f0370ac2f

  • SHA256

    576846688affd1beddef344a080b78728e8d649c6f75068899cde008fa501d83

  • SHA512

    5618fcce1bb08e1f154e51dfe1cf4d9a1866bdbbf085703ec5d578132f2194bbc96ad76237c439cc970d9207f48568ac9a1af63cf3e163c941d51cd4f4ee4205

Score
10/10

Malware Config

Targets

    • Target

      576846688affd1beddef344a080b78728e8d649c6f75068899cde008fa501d83

    • Size

      140KB

    • MD5

      a9a0fed71fb7d2c87d0573c2ef58a965

    • SHA1

      c4f1ec24d582759c4429df2a4a8c161f0370ac2f

    • SHA256

      576846688affd1beddef344a080b78728e8d649c6f75068899cde008fa501d83

    • SHA512

      5618fcce1bb08e1f154e51dfe1cf4d9a1866bdbbf085703ec5d578132f2194bbc96ad76237c439cc970d9207f48568ac9a1af63cf3e163c941d51cd4f4ee4205

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks