General

  • Target

    d5c0e0e7c51dcc4f7e1f3fb255406981

  • Size

    173KB

  • Sample

    221213-xxcp9aac6w

  • MD5

    d5c0e0e7c51dcc4f7e1f3fb255406981

  • SHA1

    b4326d1ca03beb5b0c5b94ff530e6d59d40e9ff3

  • SHA256

    07f8e9808c4389c587231adc10c758dcb030f304ef022697b3cf1cc4099a106e

  • SHA512

    3116ed7ec140006342bfb11089ea866a9c14476740b46d67a05412aafc691b4c02ae0fda8d82805512f655d2a9bbb97bd5402a46737e3a54aeb869f61ef8562c

  • SSDEEP

    3072:4yumOmCbXsOglgAQ37RKctOfkjl54tfRTc:CfA

Score
10/10

Malware Config

Targets

    • Target

      d5c0e0e7c51dcc4f7e1f3fb255406981

    • Size

      173KB

    • MD5

      d5c0e0e7c51dcc4f7e1f3fb255406981

    • SHA1

      b4326d1ca03beb5b0c5b94ff530e6d59d40e9ff3

    • SHA256

      07f8e9808c4389c587231adc10c758dcb030f304ef022697b3cf1cc4099a106e

    • SHA512

      3116ed7ec140006342bfb11089ea866a9c14476740b46d67a05412aafc691b4c02ae0fda8d82805512f655d2a9bbb97bd5402a46737e3a54aeb869f61ef8562c

    • SSDEEP

      3072:4yumOmCbXsOglgAQ37RKctOfkjl54tfRTc:CfA

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks