General

  • Target

    ee21f9e81c00a9c0706fc4db0b1a1e76ddbb70e0b866f78e7911583b76925d3b

  • Size

    68KB

  • Sample

    220201-db6lnafehp

  • MD5

    a5ef3de6aa4f16059e50a8e930bba778

  • SHA1

    8224ceeea69bad9ff6fcdc9a7903cce938119f33

  • SHA256

    ee21f9e81c00a9c0706fc4db0b1a1e76ddbb70e0b866f78e7911583b76925d3b

  • SHA512

    9befe3fdee3519d9e8ab19a98e07c2b910b2ba0ea31a9313566841fcff96c34c97f27996fdd5cb739733a7d7076fed74bfc635e3c612f535ccc5378766cee4f6

Score
10/10

Malware Config

Targets

    • Target

      ee21f9e81c00a9c0706fc4db0b1a1e76ddbb70e0b866f78e7911583b76925d3b

    • Size

      68KB

    • MD5

      a5ef3de6aa4f16059e50a8e930bba778

    • SHA1

      8224ceeea69bad9ff6fcdc9a7903cce938119f33

    • SHA256

      ee21f9e81c00a9c0706fc4db0b1a1e76ddbb70e0b866f78e7911583b76925d3b

    • SHA512

      9befe3fdee3519d9e8ab19a98e07c2b910b2ba0ea31a9313566841fcff96c34c97f27996fdd5cb739733a7d7076fed74bfc635e3c612f535ccc5378766cee4f6

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Sets service image path in registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks