General

  • Target

    5d957233382cb6daeeb6aa31fb8c4389e3ef5e609c2c9c71e106287b2cab80d0

  • Size

    826KB

  • Sample

    221125-j9kpqsdd88

  • MD5

    1077e927cb7cb62f71214b6fe9b72973

  • SHA1

    af74d8ada7d7528e90ce01ec7a9d84729f0e72fb

  • SHA256

    5d957233382cb6daeeb6aa31fb8c4389e3ef5e609c2c9c71e106287b2cab80d0

  • SHA512

    49b531a228721622e2c713cb32562643d6a870e5c32125fa30a5be4b6e845d4ccc4bfb535e8b00ae1f5f07ba69908163e09d1c968f7b03ab927a36f4158ede5c

  • SSDEEP

    6144:5k3hOdsylKlgryzc4bNhZF+E+W2kQCAH8SD4HW44KwACfnVIGI70:tCCD

Score
10/10

Malware Config

Targets

    • Target

      5d957233382cb6daeeb6aa31fb8c4389e3ef5e609c2c9c71e106287b2cab80d0

    • Size

      826KB

    • MD5

      1077e927cb7cb62f71214b6fe9b72973

    • SHA1

      af74d8ada7d7528e90ce01ec7a9d84729f0e72fb

    • SHA256

      5d957233382cb6daeeb6aa31fb8c4389e3ef5e609c2c9c71e106287b2cab80d0

    • SHA512

      49b531a228721622e2c713cb32562643d6a870e5c32125fa30a5be4b6e845d4ccc4bfb535e8b00ae1f5f07ba69908163e09d1c968f7b03ab927a36f4158ede5c

    • SSDEEP

      6144:5k3hOdsylKlgryzc4bNhZF+E+W2kQCAH8SD4HW44KwACfnVIGI70:tCCD

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks