General

  • Target

    0aedf2ca42310529d109d8fcd69c24df

  • Size

    121KB

  • Sample

    221213-xw7t1aac51

  • MD5

    0aedf2ca42310529d109d8fcd69c24df

  • SHA1

    972f2aaf543b46e37f2e495082646c6830985cae

  • SHA256

    60de583ee8cd7da1481f50156f3e5fbdde664156aebcfeadf44539bcabe393f7

  • SHA512

    d34170f2ef29d25a275151ef9a1a9f33d41a2b8709accac6560b4e5681d2ef2402c82048a4d633f8e478f11ebb46ad7ffc75c540406ce13b27850830bf7b603e

  • SSDEEP

    3072:kk3hOdsylKlgryzc4bNhZFGzE+cL2knboOglgAQ3NRKEqhG2pKxyTPQC:kk3hOdsylKlgryzc4bNhZF+E+W2knc

Score
10/10

Malware Config

Targets

    • Target

      0aedf2ca42310529d109d8fcd69c24df

    • Size

      121KB

    • MD5

      0aedf2ca42310529d109d8fcd69c24df

    • SHA1

      972f2aaf543b46e37f2e495082646c6830985cae

    • SHA256

      60de583ee8cd7da1481f50156f3e5fbdde664156aebcfeadf44539bcabe393f7

    • SHA512

      d34170f2ef29d25a275151ef9a1a9f33d41a2b8709accac6560b4e5681d2ef2402c82048a4d633f8e478f11ebb46ad7ffc75c540406ce13b27850830bf7b603e

    • SSDEEP

      3072:kk3hOdsylKlgryzc4bNhZFGzE+cL2knboOglgAQ3NRKEqhG2pKxyTPQC:kk3hOdsylKlgryzc4bNhZF+E+W2knc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks