General

  • Target

    SecuriteInfo.com.Exploit.Siggen3.17232.17500.3732

  • Size

    33KB

  • Sample

    220816-jly78ahad7

  • MD5

    72b9a844ed7ab767c1de85facfb4ad04

  • SHA1

    88d41799156fcc5c6dc80124cc55cc3f96d940b6

  • SHA256

    392de25228482e17400c27ca87cfe91ddf60b1dedcffd36cad1c52c6a0f7c4d0

  • SHA512

    7214899618bd9ec54db02340a86a345c5273d12c4694f29ebff0d5515fd1eec72b4b4a30f1a267d3e070d7a2d92dbb850ec5f1bec88f0509e103b6f380c9f28b

Score
10/10

Malware Config

Targets

    • Target

      SecuriteInfo.com.Exploit.Siggen3.17232.17500.3732

    • Size

      33KB

    • MD5

      72b9a844ed7ab767c1de85facfb4ad04

    • SHA1

      88d41799156fcc5c6dc80124cc55cc3f96d940b6

    • SHA256

      392de25228482e17400c27ca87cfe91ddf60b1dedcffd36cad1c52c6a0f7c4d0

    • SHA512

      7214899618bd9ec54db02340a86a345c5273d12c4694f29ebff0d5515fd1eec72b4b4a30f1a267d3e070d7a2d92dbb850ec5f1bec88f0509e103b6f380c9f28b

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks