General

  • Target

    d2dd95ab8754841524a840a32441f1c9ff0a1d83a42e7d6540c3265c0ae307e5

  • Size

    80KB

  • Sample

    220201-br6v9afca6

  • MD5

    50c6b1b805ec8888b55e21cfa0b57ece

  • SHA1

    65780953a32da22a7f84076ec1510cd4e8528cf4

  • SHA256

    d2dd95ab8754841524a840a32441f1c9ff0a1d83a42e7d6540c3265c0ae307e5

  • SHA512

    c49fe7f6013a8e14214c17d483fcaf906bc8bcce98c297be9744aa4e0fd2a73cbe758bd786eb70926b27686ee294bacd68136583ac0226fae39d16c0b31666f1

Score
10/10

Malware Config

Targets

    • Target

      d2dd95ab8754841524a840a32441f1c9ff0a1d83a42e7d6540c3265c0ae307e5

    • Size

      80KB

    • MD5

      50c6b1b805ec8888b55e21cfa0b57ece

    • SHA1

      65780953a32da22a7f84076ec1510cd4e8528cf4

    • SHA256

      d2dd95ab8754841524a840a32441f1c9ff0a1d83a42e7d6540c3265c0ae307e5

    • SHA512

      c49fe7f6013a8e14214c17d483fcaf906bc8bcce98c297be9744aa4e0fd2a73cbe758bd786eb70926b27686ee294bacd68136583ac0226fae39d16c0b31666f1

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Sets service image path in registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks