General

  • Target

    35a74ddb4036415dd55b0128866782d2069e65fe3222e7e2b28cd990a7656c52

  • Size

    110KB

  • Sample

    221125-kdqfsahb8y

  • MD5

    2c6ebf756130f7b9dd6ec00f7bcef7be

  • SHA1

    61f0abc3c010eac2928d7007904eb73bd9b9723a

  • SHA256

    35a74ddb4036415dd55b0128866782d2069e65fe3222e7e2b28cd990a7656c52

  • SHA512

    a9060c6625bfabc471358a94057dd80be1af6f0af1fede149ef8c570deed78f95f97ca7469ca04786bf5ac1a80c78c7f74a5a9a6fee35aeb73b5f9fc5b46d1d1

  • SSDEEP

    3072:dKpb8rGYrMPelwhKmFV5xtezEsgrdgZArP0glZxL1VquK:dKpb8rGYrMPelwhKmFV5xtuEsgrdgZ4I

Score
10/10

Malware Config

Targets

    • Target

      35a74ddb4036415dd55b0128866782d2069e65fe3222e7e2b28cd990a7656c52

    • Size

      110KB

    • MD5

      2c6ebf756130f7b9dd6ec00f7bcef7be

    • SHA1

      61f0abc3c010eac2928d7007904eb73bd9b9723a

    • SHA256

      35a74ddb4036415dd55b0128866782d2069e65fe3222e7e2b28cd990a7656c52

    • SHA512

      a9060c6625bfabc471358a94057dd80be1af6f0af1fede149ef8c570deed78f95f97ca7469ca04786bf5ac1a80c78c7f74a5a9a6fee35aeb73b5f9fc5b46d1d1

    • SSDEEP

      3072:dKpb8rGYrMPelwhKmFV5xtezEsgrdgZArP0glZxL1VquK:dKpb8rGYrMPelwhKmFV5xtuEsgrdgZ4I

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Use of msiexec (install) with remote resource

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks