General

  • Target

    ea6ced3730495e2231c1a755fcc1aefac7622ac4bd5e269b2a5996572acb42f9

  • Size

    79KB

  • Sample

    220131-3ts6qaeca5

  • MD5

    780a4c89ba8e4af56e557b7faf73b42b

  • SHA1

    d255716d5e2a6ce57ec07f13de38d2000dd3bb8d

  • SHA256

    ea6ced3730495e2231c1a755fcc1aefac7622ac4bd5e269b2a5996572acb42f9

  • SHA512

    37b66f2ba70cf1dd785fe21f49627e208c2c3d1f92bfc5b39882099109fbcb6822366d4a876062a8b66c0b4a9b9098333fc3b21792786be1f3ee2346a6e82800

Score
10/10

Malware Config

Targets

    • Target

      ea6ced3730495e2231c1a755fcc1aefac7622ac4bd5e269b2a5996572acb42f9

    • Size

      79KB

    • MD5

      780a4c89ba8e4af56e557b7faf73b42b

    • SHA1

      d255716d5e2a6ce57ec07f13de38d2000dd3bb8d

    • SHA256

      ea6ced3730495e2231c1a755fcc1aefac7622ac4bd5e269b2a5996572acb42f9

    • SHA512

      37b66f2ba70cf1dd785fe21f49627e208c2c3d1f92bfc5b39882099109fbcb6822366d4a876062a8b66c0b4a9b9098333fc3b21792786be1f3ee2346a6e82800

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Sets service image path in registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks