General

  • Target

    SecuriteInfo.com.Exploit.Siggen3.17232.23052.24591

  • Size

    33KB

  • Sample

    220816-jle5caebgr

  • MD5

    7f57f9f35e9465cfc8fbac31913db94e

  • SHA1

    d35cb428f2f57ce38f7c6e71e128bce88fc5fd58

  • SHA256

    78f4a26a6d9e52be09cda8edeef93c3f2886ef7cdda107e49c88dbf5bfe3c962

  • SHA512

    3f2e965a49bac3cc2a29fb37cd91976e379b74f697d933fe6b8f648e2c031c465fb63c6eedc94832dc404389577ff86e8d8f8b48938df03757100657fd182999

Score
10/10

Malware Config

Targets

    • Target

      SecuriteInfo.com.Exploit.Siggen3.17232.23052.24591

    • Size

      33KB

    • MD5

      7f57f9f35e9465cfc8fbac31913db94e

    • SHA1

      d35cb428f2f57ce38f7c6e71e128bce88fc5fd58

    • SHA256

      78f4a26a6d9e52be09cda8edeef93c3f2886ef7cdda107e49c88dbf5bfe3c962

    • SHA512

      3f2e965a49bac3cc2a29fb37cd91976e379b74f697d933fe6b8f648e2c031c465fb63c6eedc94832dc404389577ff86e8d8f8b48938df03757100657fd182999

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks