General

  • Target

    1433ca5f32a79c56665a4c1748551f80

  • Size

    172KB

  • Sample

    230221-vmkxrsff23

  • MD5

    1433ca5f32a79c56665a4c1748551f80

  • SHA1

    2d94cd918fc8ebd5655290f7892e1d394b7cbcd8

  • SHA256

    bdbca83cdf8f63b9dc96a4cfd906ed1dd8c577a21973b43852c05ad715e22a39

  • SHA512

    96651e72b2c91ff2ba0b2718468e2ae351a43ec4323311e065112a87fcd9b9987451da3e3e359b2b5e984cc4209a89950471aa792bd8907931484ba6e071fe68

  • SSDEEP

    3072:ik3hOdsylKlgryzc4bNhZFGzE+cL2knYrl02jcc0lbxOGlJtXwALvPhqnhDqju:ik3hOdsylKlgryzc4bNhZF+E+W2knYrh

Score
10/10

Malware Config

Targets

    • Target

      1433ca5f32a79c56665a4c1748551f80

    • Size

      172KB

    • MD5

      1433ca5f32a79c56665a4c1748551f80

    • SHA1

      2d94cd918fc8ebd5655290f7892e1d394b7cbcd8

    • SHA256

      bdbca83cdf8f63b9dc96a4cfd906ed1dd8c577a21973b43852c05ad715e22a39

    • SHA512

      96651e72b2c91ff2ba0b2718468e2ae351a43ec4323311e065112a87fcd9b9987451da3e3e359b2b5e984cc4209a89950471aa792bd8907931484ba6e071fe68

    • SSDEEP

      3072:ik3hOdsylKlgryzc4bNhZFGzE+cL2knYrl02jcc0lbxOGlJtXwALvPhqnhDqju:ik3hOdsylKlgryzc4bNhZF+E+W2knYrh

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks