General

  • Target

    SecuriteInfo.com.Exploit.Siggen3.17232.13662.19165

  • Size

    33KB

  • Sample

    220816-jly78ahac9

  • MD5

    5697889766e4385824c686b931e751fb

  • SHA1

    24707eb5f1fccc64376493fd5fccb8deabe4ad11

  • SHA256

    51a60269cd9f235a93ac58aca692e19058161c78531a1af3cb35a8051a373eca

  • SHA512

    9ea8a6667596f8c97a22c01fcd7e5f6d794decf12989e6bde5d711344f9b5e3b2fa3a7fa21c0b6cf50a37a0ba6067ad57e427e4f12a3144906f36939c27fc75c

Score
10/10

Malware Config

Targets

    • Target

      SecuriteInfo.com.Exploit.Siggen3.17232.13662.19165

    • Size

      33KB

    • MD5

      5697889766e4385824c686b931e751fb

    • SHA1

      24707eb5f1fccc64376493fd5fccb8deabe4ad11

    • SHA256

      51a60269cd9f235a93ac58aca692e19058161c78531a1af3cb35a8051a373eca

    • SHA512

      9ea8a6667596f8c97a22c01fcd7e5f6d794decf12989e6bde5d711344f9b5e3b2fa3a7fa21c0b6cf50a37a0ba6067ad57e427e4f12a3144906f36939c27fc75c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks