General

  • Target

    b64d2cbb5fb5f49a437afc620d6bcfe9813e35f991a7739892aa92ad83af5f51

  • Size

    270KB

  • Sample

    221203-pxpqtabc93

  • MD5

    8fc35fb05eb453cbb26c78223d83d228

  • SHA1

    595a26457e18433f2deff3303bca0b534a510fa0

  • SHA256

    b64d2cbb5fb5f49a437afc620d6bcfe9813e35f991a7739892aa92ad83af5f51

  • SHA512

    e94ee93c8ce2e99071dc519c64396f5eef1fac574b332e8da850ad79fd6d0852e6f1da175226d003bc6cc8efead32829bb9c192d36e54991f8c13fe3265f9f8e

  • SSDEEP

    3072:YDvyhNg8npgdX5wndXzmHfTZjVbrzQ7ITk98aJtXwb5kBE/Rp0:YogdpCmF4K

Score
10/10

Malware Config

Targets

    • Target

      b64d2cbb5fb5f49a437afc620d6bcfe9813e35f991a7739892aa92ad83af5f51

    • Size

      270KB

    • MD5

      8fc35fb05eb453cbb26c78223d83d228

    • SHA1

      595a26457e18433f2deff3303bca0b534a510fa0

    • SHA256

      b64d2cbb5fb5f49a437afc620d6bcfe9813e35f991a7739892aa92ad83af5f51

    • SHA512

      e94ee93c8ce2e99071dc519c64396f5eef1fac574b332e8da850ad79fd6d0852e6f1da175226d003bc6cc8efead32829bb9c192d36e54991f8c13fe3265f9f8e

    • SSDEEP

      3072:YDvyhNg8npgdX5wndXzmHfTZjVbrzQ7ITk98aJtXwb5kBE/Rp0:YogdpCmF4K

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks