General

  • Target

    46ef92741b21febd56c2545e500972f7ec4b8e7a87428164711c50d889564a93

  • Size

    524KB

  • Sample

    220521-mlwzmsfbbq

  • MD5

    b8eb611067136ae5f8b758f016a18f60

  • SHA1

    b731dc4669e547e78941f393f585fada97836a3d

  • SHA256

    46ef92741b21febd56c2545e500972f7ec4b8e7a87428164711c50d889564a93

  • SHA512

    c39773a745b633722a17da7c758721a21d69615c23376951a8eedd4ea3f5b9dc3b8936c431363c538d47491c29c79bb61a525f5beaf47ed64bca2ad137b8cc4a

Score
10/10

Malware Config

Targets

    • Target

      46ef92741b21febd56c2545e500972f7ec4b8e7a87428164711c50d889564a93

    • Size

      524KB

    • MD5

      b8eb611067136ae5f8b758f016a18f60

    • SHA1

      b731dc4669e547e78941f393f585fada97836a3d

    • SHA256

      46ef92741b21febd56c2545e500972f7ec4b8e7a87428164711c50d889564a93

    • SHA512

      c39773a745b633722a17da7c758721a21d69615c23376951a8eedd4ea3f5b9dc3b8936c431363c538d47491c29c79bb61a525f5beaf47ed64bca2ad137b8cc4a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks