General

  • Target

    1f2ed0a44bfe66ef53582a3cc55e4417

  • Size

    207KB

  • Sample

    221122-1chbsadc2v

  • MD5

    1f2ed0a44bfe66ef53582a3cc55e4417

  • SHA1

    8ce71a8bd2933924fd840777711a34154e4c040d

  • SHA256

    107303e82acc31cdd39920feb402e51744237c92a4a6620dbb5c3f36cb1c274f

  • SHA512

    cbc8e5971306f890a193bac344f8a7adb504b1b2d5e5ea2aad5aad3b9ade29e253b60ffd7b207b6b785869744b7b894bd2c0c94c758912bece09a6d455c70749

  • SSDEEP

    6144:uTxHzHVzJky3eEGVdajJ66tAhUJOO3NZ7xsego:uRbrkyuEGfMuhU7rN5

Score
10/10

Malware Config

Targets

    • Target

      1f2ed0a44bfe66ef53582a3cc55e4417

    • Size

      207KB

    • MD5

      1f2ed0a44bfe66ef53582a3cc55e4417

    • SHA1

      8ce71a8bd2933924fd840777711a34154e4c040d

    • SHA256

      107303e82acc31cdd39920feb402e51744237c92a4a6620dbb5c3f36cb1c274f

    • SHA512

      cbc8e5971306f890a193bac344f8a7adb504b1b2d5e5ea2aad5aad3b9ade29e253b60ffd7b207b6b785869744b7b894bd2c0c94c758912bece09a6d455c70749

    • SSDEEP

      6144:uTxHzHVzJky3eEGVdajJ66tAhUJOO3NZ7xsego:uRbrkyuEGfMuhU7rN5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks