General

  • Target

    5ab0d8beef342a0a29e4e04db28ddd97

  • Size

    181KB

  • Sample

    230125-j2tyfaha9w

  • MD5

    5ab0d8beef342a0a29e4e04db28ddd97

  • SHA1

    6768f190887c03a41c3e2e16e4d83658d0a8dadc

  • SHA256

    6290e0c6d2139689f9e42fa97e1f7376e9e9a020d65d0356bda6e7b72742d22e

  • SHA512

    d94275164a3a9d8419463ea1c94054d1946a1f161647f1520ae28ab89c3f15fe4223b353bc0c9a3a0557bfdb77ad6a282f89fc47c7fbfbe917c9e81e2c64e9ff

  • SSDEEP

    3072:xfAEqqoboYOaTfQCpr+0erj7cN2BcbTqiUFdhrrmDxO:xHobo1qfQ4+0MrBcB0dhrKk

Score
10/10

Malware Config

Targets

    • Target

      5ab0d8beef342a0a29e4e04db28ddd97

    • Size

      181KB

    • MD5

      5ab0d8beef342a0a29e4e04db28ddd97

    • SHA1

      6768f190887c03a41c3e2e16e4d83658d0a8dadc

    • SHA256

      6290e0c6d2139689f9e42fa97e1f7376e9e9a020d65d0356bda6e7b72742d22e

    • SHA512

      d94275164a3a9d8419463ea1c94054d1946a1f161647f1520ae28ab89c3f15fe4223b353bc0c9a3a0557bfdb77ad6a282f89fc47c7fbfbe917c9e81e2c64e9ff

    • SSDEEP

      3072:xfAEqqoboYOaTfQCpr+0erj7cN2BcbTqiUFdhrrmDxO:xHobo1qfQ4+0MrBcB0dhrKk

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks