General

  • Target

    de2e56f52c0de70b7f12f4ea3294090f

  • Size

    285KB

  • Sample

    230221-vnmsrahe7x

  • MD5

    de2e56f52c0de70b7f12f4ea3294090f

  • SHA1

    6ccf3f39d97ed65fc63c63b3f89d803623339c14

  • SHA256

    499a933bb0f2647908c79566b99eb38a607c1810e38985e5296175d79f239563

  • SHA512

    03ff23f544e3766edeef44233bd6dc21d7bdfc438bbd49c5508308ee2aeaa5f601c45f7e1b3919b1b468e1f5e706b450783457a4804ac3457544d82e73625b6e

  • SSDEEP

    3072:K8mDaqkCT+93VRB1PqvvDSadXVp0EQZyPsCdxpHJ8rfVrxTF/2oLwdxEGgXdNna0:OaqkCT+Zcl7Nd4Rmf4ClHRenJ7

Score
10/10

Malware Config

Targets

    • Target

      de2e56f52c0de70b7f12f4ea3294090f

    • Size

      285KB

    • MD5

      de2e56f52c0de70b7f12f4ea3294090f

    • SHA1

      6ccf3f39d97ed65fc63c63b3f89d803623339c14

    • SHA256

      499a933bb0f2647908c79566b99eb38a607c1810e38985e5296175d79f239563

    • SHA512

      03ff23f544e3766edeef44233bd6dc21d7bdfc438bbd49c5508308ee2aeaa5f601c45f7e1b3919b1b468e1f5e706b450783457a4804ac3457544d82e73625b6e

    • SSDEEP

      3072:K8mDaqkCT+93VRB1PqvvDSadXVp0EQZyPsCdxpHJ8rfVrxTF/2oLwdxEGgXdNna0:OaqkCT+Zcl7Nd4Rmf4ClHRenJ7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks