General

  • Target

    8b65220b9a1cd94d73164dfde581230880e4114f6213b6713e07c34c7ac57995

  • Size

    57KB

  • Sample

    220520-z8jdaaggdk

  • MD5

    fbc293fa98d3db32b53ae54f12ac58b5

  • SHA1

    d8dcf582bfbe771ca79a18fb1d1b4a4cb77d9b36

  • SHA256

    8b65220b9a1cd94d73164dfde581230880e4114f6213b6713e07c34c7ac57995

  • SHA512

    8c555b7870b8108c56fc9344e1001b8b0d9353e4b993e6c1a28af90071cc3b03b3986da9d8189f2d02e5298b94364bd387eeec0f5c2c28461a9769de285ce244

Score
10/10

Malware Config

Targets

    • Target

      8b65220b9a1cd94d73164dfde581230880e4114f6213b6713e07c34c7ac57995

    • Size

      57KB

    • MD5

      fbc293fa98d3db32b53ae54f12ac58b5

    • SHA1

      d8dcf582bfbe771ca79a18fb1d1b4a4cb77d9b36

    • SHA256

      8b65220b9a1cd94d73164dfde581230880e4114f6213b6713e07c34c7ac57995

    • SHA512

      8c555b7870b8108c56fc9344e1001b8b0d9353e4b993e6c1a28af90071cc3b03b3986da9d8189f2d02e5298b94364bd387eeec0f5c2c28461a9769de285ce244

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks