General

  • Target

    7eda9593b5941e3572f7f72fb39e64161e55bbc50a771dc0d17f6312741b2bf7

  • Size

    30KB

  • Sample

    220521-ekth5ahea2

  • MD5

    ac75ab65297e0443bc14fa2025273310

  • SHA1

    436719387ae939ae31aba47db8a3ae380d7dd09c

  • SHA256

    7eda9593b5941e3572f7f72fb39e64161e55bbc50a771dc0d17f6312741b2bf7

  • SHA512

    f767dbef9cd943fff0fd0474eafb1bc842833908881650141a7e35eea2d249626eaea6d6f2c76150172cf8b94c484aecf02edef6c04cdf8f3c68ffa03eb32470

Score
10/10

Malware Config

Targets

    • Target

      7eda9593b5941e3572f7f72fb39e64161e55bbc50a771dc0d17f6312741b2bf7

    • Size

      30KB

    • MD5

      ac75ab65297e0443bc14fa2025273310

    • SHA1

      436719387ae939ae31aba47db8a3ae380d7dd09c

    • SHA256

      7eda9593b5941e3572f7f72fb39e64161e55bbc50a771dc0d17f6312741b2bf7

    • SHA512

      f767dbef9cd943fff0fd0474eafb1bc842833908881650141a7e35eea2d249626eaea6d6f2c76150172cf8b94c484aecf02edef6c04cdf8f3c68ffa03eb32470

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks