General

  • Target

    525e65171ae087a5d835f7e3838101c81fa88390c498011891f44e67b3983c7a.bin

  • Size

    15.7MB

  • Sample

    220203-m2xk4sgbc9

  • MD5

    0917fa630a2362b243048a1fbb6123a7

  • SHA1

    03cf1586257c0d97e1ea163a300ef1d40b6495ec

  • SHA256

    525e65171ae087a5d835f7e3838101c81fa88390c498011891f44e67b3983c7a

  • SHA512

    6db97f3670c5aebc0e5e203d43ef6b6fcedd5a30f57e61af18052c50a8a59132a39fb4faa8adadbc2b458e4d8f49a43e4d20f3af2afba1c8e9add319f3da8f5c

Score
10/10

Malware Config

Targets

    • Target

      525e65171ae087a5d835f7e3838101c81fa88390c498011891f44e67b3983c7a.bin

    • Size

      15.7MB

    • MD5

      0917fa630a2362b243048a1fbb6123a7

    • SHA1

      03cf1586257c0d97e1ea163a300ef1d40b6495ec

    • SHA256

      525e65171ae087a5d835f7e3838101c81fa88390c498011891f44e67b3983c7a

    • SHA512

      6db97f3670c5aebc0e5e203d43ef6b6fcedd5a30f57e61af18052c50a8a59132a39fb4faa8adadbc2b458e4d8f49a43e4d20f3af2afba1c8e9add319f3da8f5c

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Sets service image path in registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks