General

  • Target

    99a0c3a57918273a370a2e9af1dc967e92846821c2198fcdddfc732f8cd15ae1

  • Size

    33KB

  • Sample

    220201-pt9a2sebfl

  • MD5

    1aeecb2827babb42468d8257aa6afdeb

  • SHA1

    653f6938e5521cf70596fc4a3f1d8c8eef21959a

  • SHA256

    99a0c3a57918273a370a2e9af1dc967e92846821c2198fcdddfc732f8cd15ae1

  • SHA512

    846874d5488fe6aebe39f7c84cdf43bb3af418835bf3bc87a0a799c108d4966121a46a5e8f5d17bd98e5fb376d09169de48e7ea1129dd1b3df72b4508dff9f4c

Score
10/10

Malware Config

Targets

    • Target

      99a0c3a57918273a370a2e9af1dc967e92846821c2198fcdddfc732f8cd15ae1

    • Size

      33KB

    • MD5

      1aeecb2827babb42468d8257aa6afdeb

    • SHA1

      653f6938e5521cf70596fc4a3f1d8c8eef21959a

    • SHA256

      99a0c3a57918273a370a2e9af1dc967e92846821c2198fcdddfc732f8cd15ae1

    • SHA512

      846874d5488fe6aebe39f7c84cdf43bb3af418835bf3bc87a0a799c108d4966121a46a5e8f5d17bd98e5fb376d09169de48e7ea1129dd1b3df72b4508dff9f4c

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Sets service image path in registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks