General

  • Target

    e352396a341852856acdeab033e52bc0e1440fe5ee92a9867db2c836f4bf588f

  • Size

    154KB

  • Sample

    221126-dny3cage97

  • MD5

    fba52be3a68237efed94861936bbe328

  • SHA1

    cba13e94d26972c9c6438eda681bbb42a53f419a

  • SHA256

    e352396a341852856acdeab033e52bc0e1440fe5ee92a9867db2c836f4bf588f

  • SHA512

    6275f12e5d6b60877924d855b85ddde195fea95d098b2a76d68065e054e08792f9c7061561dc5d29acfb0781871c42f854746bc0a4608545ead3f6d088180044

  • SSDEEP

    3072:SeMxwjLk2pR+BFttquNGqiq94w+WwsP22jcc0lbxOKTjXJtXw9q5:/MxwjtL+9f2Q

Score
10/10

Malware Config

Targets

    • Target

      e352396a341852856acdeab033e52bc0e1440fe5ee92a9867db2c836f4bf588f

    • Size

      154KB

    • MD5

      fba52be3a68237efed94861936bbe328

    • SHA1

      cba13e94d26972c9c6438eda681bbb42a53f419a

    • SHA256

      e352396a341852856acdeab033e52bc0e1440fe5ee92a9867db2c836f4bf588f

    • SHA512

      6275f12e5d6b60877924d855b85ddde195fea95d098b2a76d68065e054e08792f9c7061561dc5d29acfb0781871c42f854746bc0a4608545ead3f6d088180044

    • SSDEEP

      3072:SeMxwjLk2pR+BFttquNGqiq94w+WwsP22jcc0lbxOKTjXJtXw9q5:/MxwjtL+9f2Q

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks