General

  • Target

    7ea07c1e113f93fc5710319850e9aff6

  • Size

    83KB

  • Sample

    221122-1akzwsda81

  • MD5

    7ea07c1e113f93fc5710319850e9aff6

  • SHA1

    33107e30de846c49ff870593d3a30004cf361ccf

  • SHA256

    710291500e327f9fb20281a77e544711882447b67d62b3767d806004a4a7ef33

  • SHA512

    613ee5f7c4f0337ef32f02cf93e533224c80a6c3847de42efb18b9be02bd66be5e58c0633ae65b71783b19588be79b9e9d83b3573d6035cf1b402bb13dfbaf3d

  • SSDEEP

    768:IDVs3+I/M7u96W0+PPjY30000JMH8QfMJDenNBJj/r+OYIVDELUPPPPPPPPPPPPh:4hGMC8W4k5NDYIVoL4yN6zD

Score
10/10

Malware Config

Targets

    • Target

      7ea07c1e113f93fc5710319850e9aff6

    • Size

      83KB

    • MD5

      7ea07c1e113f93fc5710319850e9aff6

    • SHA1

      33107e30de846c49ff870593d3a30004cf361ccf

    • SHA256

      710291500e327f9fb20281a77e544711882447b67d62b3767d806004a4a7ef33

    • SHA512

      613ee5f7c4f0337ef32f02cf93e533224c80a6c3847de42efb18b9be02bd66be5e58c0633ae65b71783b19588be79b9e9d83b3573d6035cf1b402bb13dfbaf3d

    • SSDEEP

      768:IDVs3+I/M7u96W0+PPjY30000JMH8QfMJDenNBJj/r+OYIVDELUPPPPPPPPPPPPh:4hGMC8W4k5NDYIVoL4yN6zD

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Drops startup file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

4
T1082

Tasks