General

  • Target

    bd7920ab4830328cb91d1d1f60b93808e318df56daa4b535e0c6e1a03f691e37

  • Size

    2.7MB

  • Sample

    220520-3jf4eahab4

  • MD5

    b3e3e01be28b21afa8a5a6058282a35a

  • SHA1

    42651de9242843083d29249301513bf80d15032a

  • SHA256

    bd7920ab4830328cb91d1d1f60b93808e318df56daa4b535e0c6e1a03f691e37

  • SHA512

    9e8b104a6a5805b2627b078fa852388cd5f4c959a3dd20ecb2396a23d625668f9d014d578f11ea59a93a804632d1efc6a288b1144e7eaebdb93a03a9af67a322

Score
10/10

Malware Config

Targets

    • Target

      bd7920ab4830328cb91d1d1f60b93808e318df56daa4b535e0c6e1a03f691e37

    • Size

      2.7MB

    • MD5

      b3e3e01be28b21afa8a5a6058282a35a

    • SHA1

      42651de9242843083d29249301513bf80d15032a

    • SHA256

      bd7920ab4830328cb91d1d1f60b93808e318df56daa4b535e0c6e1a03f691e37

    • SHA512

      9e8b104a6a5805b2627b078fa852388cd5f4c959a3dd20ecb2396a23d625668f9d014d578f11ea59a93a804632d1efc6a288b1144e7eaebdb93a03a9af67a322

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks