General

  • Target

    5c50dbc8fa64024ba74d6af4dce9e076dc095152caf9d4f96df2dcfd5c06b3ba

  • Size

    118KB

  • Sample

    221129-s4bz3sce92

  • MD5

    f5e229509c3d4a460b21f305f3b4419c

  • SHA1

    95e91b3223ad8aed5391baf3edb5529f7a67aacb

  • SHA256

    5c50dbc8fa64024ba74d6af4dce9e076dc095152caf9d4f96df2dcfd5c06b3ba

  • SHA512

    abd222d2ee822fafbfe510c586dcd5683e2b276df0befd907cb9a0ec5e738412711262137bbd534487688fe9798b43ab0a0d447515864fcef3dda7c92a84c326

  • SSDEEP

    3072:d3V/0m+zjWVbauzQ7ITk9f2AJtXw55ksk:dqC2

Score
10/10

Malware Config

Targets

    • Target

      5c50dbc8fa64024ba74d6af4dce9e076dc095152caf9d4f96df2dcfd5c06b3ba

    • Size

      118KB

    • MD5

      f5e229509c3d4a460b21f305f3b4419c

    • SHA1

      95e91b3223ad8aed5391baf3edb5529f7a67aacb

    • SHA256

      5c50dbc8fa64024ba74d6af4dce9e076dc095152caf9d4f96df2dcfd5c06b3ba

    • SHA512

      abd222d2ee822fafbfe510c586dcd5683e2b276df0befd907cb9a0ec5e738412711262137bbd534487688fe9798b43ab0a0d447515864fcef3dda7c92a84c326

    • SSDEEP

      3072:d3V/0m+zjWVbauzQ7ITk9f2AJtXw55ksk:dqC2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks