General

  • Target

    f7f00a718d5bacac5118cc742412d41d7281e0021f4f5eb0463fe23a12842ba2

  • Size

    56KB

  • Sample

    211024-lgb81adfa9

  • MD5

    25ce2ba3e886862cb77cb235a40ed64e

  • SHA1

    a5ad776f4e632ad13315df0096978cc6962c6429

  • SHA256

    f7f00a718d5bacac5118cc742412d41d7281e0021f4f5eb0463fe23a12842ba2

  • SHA512

    c8d94720d9711e7b172807586c0a4f8d2664cc6ff9647a23a999ecdf931cc2403178bf79de520d9fad7e2af73f63d4adb290a6ba819dd0130bc6a7f7efa56438

Malware Config

Targets

    • Target

      f7f00a718d5bacac5118cc742412d41d7281e0021f4f5eb0463fe23a12842ba2

    • Size

      56KB

    • MD5

      25ce2ba3e886862cb77cb235a40ed64e

    • SHA1

      a5ad776f4e632ad13315df0096978cc6962c6429

    • SHA256

      f7f00a718d5bacac5118cc742412d41d7281e0021f4f5eb0463fe23a12842ba2

    • SHA512

      c8d94720d9711e7b172807586c0a4f8d2664cc6ff9647a23a999ecdf931cc2403178bf79de520d9fad7e2af73f63d4adb290a6ba819dd0130bc6a7f7efa56438

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks