General

  • Target

    c3976d6eb9247f532bb1cc264f248c3f3f9f2d6cbcd18f88c0944ca6cb9f7c2b

  • Size

    220KB

  • Sample

    221125-x4at8shg58

  • MD5

    33e995e62456abe5a30086c03d683548

  • SHA1

    d217b9433ecdba83bdfc5dbfc9d5652f2ce2c642

  • SHA256

    c3976d6eb9247f532bb1cc264f248c3f3f9f2d6cbcd18f88c0944ca6cb9f7c2b

  • SHA512

    f8d7cafcd1ec83c281097a9b6e2c8267a603517d7259c4f8db421b2af2e2f97805557c39ae1a5f903d2f327b733197d27380cc0c842f0aaa7f8e498819c00e41

  • SSDEEP

    3072:mHRO0a3dRW6RSx7dOpnmZWVbrzQ7ITSnZQjua5t:yRuW6Rgd

Score
10/10

Malware Config

Targets

    • Target

      c3976d6eb9247f532bb1cc264f248c3f3f9f2d6cbcd18f88c0944ca6cb9f7c2b

    • Size

      220KB

    • MD5

      33e995e62456abe5a30086c03d683548

    • SHA1

      d217b9433ecdba83bdfc5dbfc9d5652f2ce2c642

    • SHA256

      c3976d6eb9247f532bb1cc264f248c3f3f9f2d6cbcd18f88c0944ca6cb9f7c2b

    • SHA512

      f8d7cafcd1ec83c281097a9b6e2c8267a603517d7259c4f8db421b2af2e2f97805557c39ae1a5f903d2f327b733197d27380cc0c842f0aaa7f8e498819c00e41

    • SSDEEP

      3072:mHRO0a3dRW6RSx7dOpnmZWVbrzQ7ITSnZQjua5t:yRuW6Rgd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks