General

  • Target

    4f6549c84e2657102d34cb899ff71544

  • Size

    109KB

  • Sample

    230111-xp6ncshh3y

  • MD5

    4f6549c84e2657102d34cb899ff71544

  • SHA1

    8b74dbeecc9790c5cf1d51e4845bfd3f982309eb

  • SHA256

    da2ad091b8f924d6b963a1e5ec4ccac09e2e8a5a61fa3b52cf43592eb8936b64

  • SHA512

    314793e5a09b130d991dec0637da6db851005847fa36d991253d0eabe28a904c7def6e2d916cbd145df32bd0a9f92c31db5db21f039c7d8d44e150363776196f

  • SSDEEP

    3072:ek3hOdsylKlgryzc4bNhZFGzE+cL2knT2jcc0lbxOG9BK9GAzKxyT:ek3hOdsylKlgryzc4bNhZF+E+W2kn8

Score
10/10

Malware Config

Targets

    • Target

      4f6549c84e2657102d34cb899ff71544

    • Size

      109KB

    • MD5

      4f6549c84e2657102d34cb899ff71544

    • SHA1

      8b74dbeecc9790c5cf1d51e4845bfd3f982309eb

    • SHA256

      da2ad091b8f924d6b963a1e5ec4ccac09e2e8a5a61fa3b52cf43592eb8936b64

    • SHA512

      314793e5a09b130d991dec0637da6db851005847fa36d991253d0eabe28a904c7def6e2d916cbd145df32bd0a9f92c31db5db21f039c7d8d44e150363776196f

    • SSDEEP

      3072:ek3hOdsylKlgryzc4bNhZFGzE+cL2knT2jcc0lbxOG9BK9GAzKxyT:ek3hOdsylKlgryzc4bNhZF+E+W2kn8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks