General

  • Target

    SecuriteInfo.com.Exploit.Siggen3.17232.19740.13459

  • Size

    33KB

  • Sample

    220816-jly78aebhp

  • MD5

    2dc1e84a3427e2418d86c4b87fcbc078

  • SHA1

    4d056539eb17ab8c4abd7e6a519ee80ede4435a9

  • SHA256

    5a4b2c98ff5ccacd78b01bfc8297ca8e4cf030124d750f5f035c21c8b1003865

  • SHA512

    2354bfb43b5178bbfc412970f39dc93b5b89f4399befb8d1993461355109923de990576de12cdf4f180e3891b32284c9a9ab15f9d62d301c668249e878ad6e0e

Score
10/10

Malware Config

Targets

    • Target

      SecuriteInfo.com.Exploit.Siggen3.17232.19740.13459

    • Size

      33KB

    • MD5

      2dc1e84a3427e2418d86c4b87fcbc078

    • SHA1

      4d056539eb17ab8c4abd7e6a519ee80ede4435a9

    • SHA256

      5a4b2c98ff5ccacd78b01bfc8297ca8e4cf030124d750f5f035c21c8b1003865

    • SHA512

      2354bfb43b5178bbfc412970f39dc93b5b89f4399befb8d1993461355109923de990576de12cdf4f180e3891b32284c9a9ab15f9d62d301c668249e878ad6e0e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks