General

  • Target

    720c1f286303887020062509221480033db5a6db8715c024508ba683674221b8

  • Size

    80KB

  • Sample

    220625-k88wlsgfe5

  • MD5

    0f7773073467e71ffe8f10cfba0b2367

  • SHA1

    51b0a693fb1fc1c17d6340b3efc7fb7fe0a3c997

  • SHA256

    720c1f286303887020062509221480033db5a6db8715c024508ba683674221b8

  • SHA512

    556a57b5720b52bec5efb4ca31caaf530512b3bc37c89a0aa4507fca1998f88cb911dea0a22d2b8288dff3604be91b63cf22c73934dba7d9ead2ad287180d47c

Score
10/10

Malware Config

Targets

    • Target

      720c1f286303887020062509221480033db5a6db8715c024508ba683674221b8

    • Size

      80KB

    • MD5

      0f7773073467e71ffe8f10cfba0b2367

    • SHA1

      51b0a693fb1fc1c17d6340b3efc7fb7fe0a3c997

    • SHA256

      720c1f286303887020062509221480033db5a6db8715c024508ba683674221b8

    • SHA512

      556a57b5720b52bec5efb4ca31caaf530512b3bc37c89a0aa4507fca1998f88cb911dea0a22d2b8288dff3604be91b63cf22c73934dba7d9ead2ad287180d47c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks