General

  • Target

    8e7fb6e2f5cab40baf71083b4406f993d482e945117f146efc9b2aeeb7772625

  • Size

    125KB

  • Sample

    210802-kxhwd2egwn

  • MD5

    27fd4e8b72e11357f0a00b5beb964920

  • SHA1

    50dafeaa2b75e183661be525fde060782a794ef6

  • SHA256

    8e7fb6e2f5cab40baf71083b4406f993d482e945117f146efc9b2aeeb7772625

  • SHA512

    68711821417302518b50207b3d3c19b6c68b9063ca5846d16d7cb0b1d7d83b50e941df4df34648c811af103547edd0b83b99f4fe40f9a61ecf88c94cb920987b

Malware Config

Targets

    • Target

      8e7fb6e2f5cab40baf71083b4406f993d482e945117f146efc9b2aeeb7772625

    • Size

      125KB

    • MD5

      27fd4e8b72e11357f0a00b5beb964920

    • SHA1

      50dafeaa2b75e183661be525fde060782a794ef6

    • SHA256

      8e7fb6e2f5cab40baf71083b4406f993d482e945117f146efc9b2aeeb7772625

    • SHA512

      68711821417302518b50207b3d3c19b6c68b9063ca5846d16d7cb0b1d7d83b50e941df4df34648c811af103547edd0b83b99f4fe40f9a61ecf88c94cb920987b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Blocklisted process makes network request

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks