General

  • Target

    b67bc1d9c7fe0672a79076e1546827e0642901cd62f7795d7a403bc3ba4a7117

  • Size

    80KB

  • Sample

    220201-bsm5jafcb3

  • MD5

    9001dfa8d69dd4e8343c164280de8535

  • SHA1

    6a53797d6df4d1ac52a9526dbdc6c5f1fb371933

  • SHA256

    b67bc1d9c7fe0672a79076e1546827e0642901cd62f7795d7a403bc3ba4a7117

  • SHA512

    c2c57af584b6dbae53f1b392cb740fc1342490c31c3ee949e6fe7cbcb58b4390bd6d2408499594c14e3e1d1ce25564186a13f509db12ee3c8bae06f9fdca5a5a

Score
10/10

Malware Config

Targets

    • Target

      b67bc1d9c7fe0672a79076e1546827e0642901cd62f7795d7a403bc3ba4a7117

    • Size

      80KB

    • MD5

      9001dfa8d69dd4e8343c164280de8535

    • SHA1

      6a53797d6df4d1ac52a9526dbdc6c5f1fb371933

    • SHA256

      b67bc1d9c7fe0672a79076e1546827e0642901cd62f7795d7a403bc3ba4a7117

    • SHA512

      c2c57af584b6dbae53f1b392cb740fc1342490c31c3ee949e6fe7cbcb58b4390bd6d2408499594c14e3e1d1ce25564186a13f509db12ee3c8bae06f9fdca5a5a

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Sets service image path in registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks