General

  • Target

    d28b9b95666eb49011c60d4cf91b42ae39e3f9e388f4d87f3e63c55626d54bb4

  • Size

    32KB

  • Sample

    220521-ermn6acgcj

  • MD5

    3759688eef1380d504950f2d182feb2a

  • SHA1

    d04c71e2fbdd885b812b0abff05ab9381f84b35c

  • SHA256

    d28b9b95666eb49011c60d4cf91b42ae39e3f9e388f4d87f3e63c55626d54bb4

  • SHA512

    a3ee0cdb252ef8cfd0495964e846538eaba3e24f9b744858d47b07512b3f17e011b69e59b39b012a21b0da16e3113d71be66cf6fd6d0a9b2e9c2484e01f03690

Score
10/10

Malware Config

Targets

    • Target

      d28b9b95666eb49011c60d4cf91b42ae39e3f9e388f4d87f3e63c55626d54bb4

    • Size

      32KB

    • MD5

      3759688eef1380d504950f2d182feb2a

    • SHA1

      d04c71e2fbdd885b812b0abff05ab9381f84b35c

    • SHA256

      d28b9b95666eb49011c60d4cf91b42ae39e3f9e388f4d87f3e63c55626d54bb4

    • SHA512

      a3ee0cdb252ef8cfd0495964e846538eaba3e24f9b744858d47b07512b3f17e011b69e59b39b012a21b0da16e3113d71be66cf6fd6d0a9b2e9c2484e01f03690

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks