General

  • Target

    2ae16de2ce0f90a0f921946a2a43d4b5220eff195f3e4cde23c3e67a8173f8b3

  • Size

    35KB

  • Sample

    221128-a1jawaff5t

  • MD5

    5dab27a18a2851cf1dcae95662a01906

  • SHA1

    fc7ebf9cbc7e5e794474775b3ca457cacde46d6a

  • SHA256

    2ae16de2ce0f90a0f921946a2a43d4b5220eff195f3e4cde23c3e67a8173f8b3

  • SHA512

    f11a17c1b905053073ac651085079cb96c2eec4e7b02661c329cd0241a9d91caab5ab8ad527bba057ffc6b739d3134774c9a7601a80d00cae3c2b1e929d88256

  • SSDEEP

    384:HaQ2RBJwytUXWsIFdzHe60HZ0jpwXzVF:QBaXWFJe15kozVF

Score
10/10

Malware Config

Targets

    • Target

      2ae16de2ce0f90a0f921946a2a43d4b5220eff195f3e4cde23c3e67a8173f8b3

    • Size

      35KB

    • MD5

      5dab27a18a2851cf1dcae95662a01906

    • SHA1

      fc7ebf9cbc7e5e794474775b3ca457cacde46d6a

    • SHA256

      2ae16de2ce0f90a0f921946a2a43d4b5220eff195f3e4cde23c3e67a8173f8b3

    • SHA512

      f11a17c1b905053073ac651085079cb96c2eec4e7b02661c329cd0241a9d91caab5ab8ad527bba057ffc6b739d3134774c9a7601a80d00cae3c2b1e929d88256

    • SSDEEP

      384:HaQ2RBJwytUXWsIFdzHe60HZ0jpwXzVF:QBaXWFJe15kozVF

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks