General

  • Target

    7e682a5a643eb9d96a3b3e248caa879ba6c08c960f8d97337d7060e146d2475c

  • Size

    37KB

  • Sample

    220204-tyqrqacdd2

  • MD5

    86f803bc46706fb543f147ab108cf358

  • SHA1

    4960d039f6e951b6fbb1df04d3d3351d558d29a5

  • SHA256

    7e682a5a643eb9d96a3b3e248caa879ba6c08c960f8d97337d7060e146d2475c

  • SHA512

    ee6200da84267fd32005512eaaab2bce021592d40c9424a443c289ad0769d0b131b5b771e819c6bf42308823bc4f4c9356ae2e541fbaf7fca1e40eccbf32e4f4

Score
10/10

Malware Config

Targets

    • Target

      7e682a5a643eb9d96a3b3e248caa879ba6c08c960f8d97337d7060e146d2475c

    • Size

      37KB

    • MD5

      86f803bc46706fb543f147ab108cf358

    • SHA1

      4960d039f6e951b6fbb1df04d3d3351d558d29a5

    • SHA256

      7e682a5a643eb9d96a3b3e248caa879ba6c08c960f8d97337d7060e146d2475c

    • SHA512

      ee6200da84267fd32005512eaaab2bce021592d40c9424a443c289ad0769d0b131b5b771e819c6bf42308823bc4f4c9356ae2e541fbaf7fca1e40eccbf32e4f4

    Score
    10/10
    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Sets service image path in registry

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks