General

  • Target

    5740597cab760481789304022438aac74fc44994073c340b08577ee582dba776

  • Size

    509KB

  • Sample

    220521-m8v1vsdcd3

  • MD5

    1cc3e165448a1507ce5e59b18a7de037

  • SHA1

    1f88a72ea7e6819edbe8af361e2258d661fc9ea5

  • SHA256

    5740597cab760481789304022438aac74fc44994073c340b08577ee582dba776

  • SHA512

    c01b6cd16f7075882250f8fa4bda864e8f7373afae637118ac20b6d3ffd9a371a46f9df86eedd69a7df63d867f0cd8714fc317e54e722dd6f5a348cd16f4861f

Score
10/10

Malware Config

Targets

    • Target

      5740597cab760481789304022438aac74fc44994073c340b08577ee582dba776

    • Size

      509KB

    • MD5

      1cc3e165448a1507ce5e59b18a7de037

    • SHA1

      1f88a72ea7e6819edbe8af361e2258d661fc9ea5

    • SHA256

      5740597cab760481789304022438aac74fc44994073c340b08577ee582dba776

    • SHA512

      c01b6cd16f7075882250f8fa4bda864e8f7373afae637118ac20b6d3ffd9a371a46f9df86eedd69a7df63d867f0cd8714fc317e54e722dd6f5a348cd16f4861f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks