General

  • Target

    532aeaaf452fbafee06bf45f0be61020d279e71a59cffc4b56486b9ddb71e8d3

  • Size

    31KB

  • Sample

    221128-ahbs3saa92

  • MD5

    68264dfa2f0b2126a9a8cdb6df52649f

  • SHA1

    1024017758284f1284894ac0b7255f5734636eb8

  • SHA256

    532aeaaf452fbafee06bf45f0be61020d279e71a59cffc4b56486b9ddb71e8d3

  • SHA512

    98dcf08d92ee46195f62674c0539ee34738ca2a9e728a9d0a787bc7aa495bab36afcce04026e4a367603d39cfab93005210af24abace45d87fb4601e6170f893

  • SSDEEP

    384:Jo6GAWRNVnoglPro3/bGGW19YiZebTtef60Fw7whiJ1qDuZ/pj:WXdqGGWHYiceykSJuwpj

Score
10/10

Malware Config

Targets

    • Target

      532aeaaf452fbafee06bf45f0be61020d279e71a59cffc4b56486b9ddb71e8d3

    • Size

      31KB

    • MD5

      68264dfa2f0b2126a9a8cdb6df52649f

    • SHA1

      1024017758284f1284894ac0b7255f5734636eb8

    • SHA256

      532aeaaf452fbafee06bf45f0be61020d279e71a59cffc4b56486b9ddb71e8d3

    • SHA512

      98dcf08d92ee46195f62674c0539ee34738ca2a9e728a9d0a787bc7aa495bab36afcce04026e4a367603d39cfab93005210af24abace45d87fb4601e6170f893

    • SSDEEP

      384:Jo6GAWRNVnoglPro3/bGGW19YiZebTtef60Fw7whiJ1qDuZ/pj:WXdqGGWHYiceykSJuwpj

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks