General

  • Target

    73f6abaef08519705893e1268706e2f48ce6fd194ff966fad7e9e5700bac46b7

  • Size

    172KB

  • Sample

    221121-pdfzkahg23

  • MD5

    22fcc09afcf8dad4d6def896a90ea200

  • SHA1

    bc30c1ec5c7511b0e1c604f47760e0c4573f6f76

  • SHA256

    73f6abaef08519705893e1268706e2f48ce6fd194ff966fad7e9e5700bac46b7

  • SHA512

    6ca6c64336125dac9450bbece7a91d0122766b780fff5b0c05807ab1afa4195bca5e6644a507c441dca3adf1ba5d2ebfab990b309d616a3675b73ca32d9163a5

  • SSDEEP

    3072:Ftl0yBU5HY3uWVbIvzQ7ITk9N3JPXy65kzs8d:J

Score
10/10

Malware Config

Targets

    • Target

      73f6abaef08519705893e1268706e2f48ce6fd194ff966fad7e9e5700bac46b7

    • Size

      172KB

    • MD5

      22fcc09afcf8dad4d6def896a90ea200

    • SHA1

      bc30c1ec5c7511b0e1c604f47760e0c4573f6f76

    • SHA256

      73f6abaef08519705893e1268706e2f48ce6fd194ff966fad7e9e5700bac46b7

    • SHA512

      6ca6c64336125dac9450bbece7a91d0122766b780fff5b0c05807ab1afa4195bca5e6644a507c441dca3adf1ba5d2ebfab990b309d616a3675b73ca32d9163a5

    • SSDEEP

      3072:Ftl0yBU5HY3uWVbIvzQ7ITk9N3JPXy65kzs8d:J

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks