General

  • Target

    6c57a7316681c265364620091d0c3987

  • Size

    165KB

  • Sample

    230314-kqej2sge3t

  • MD5

    6c57a7316681c265364620091d0c3987

  • SHA1

    7bb5f4e9c81fb1edd4082aaee065815b255cc2c4

  • SHA256

    245ce9ad11a30c9676c1e395534ecb503f1893bf0ec18d4cd8e46779ede5cbc8

  • SHA512

    1efaa1189ae8ea5ffe54c2a58d910e444096e0d371b60bd47bb045fd96de15894a2c16ff407c73917e585a38a1024cd15c2c050fa4f61421053abea4e1c7be06

  • SSDEEP

    3072:xAOmmA2jcc0lbxOGXJtXwygPQ6VCBxVCS:M+P

Score
10/10

Malware Config

Targets

    • Target

      6c57a7316681c265364620091d0c3987

    • Size

      165KB

    • MD5

      6c57a7316681c265364620091d0c3987

    • SHA1

      7bb5f4e9c81fb1edd4082aaee065815b255cc2c4

    • SHA256

      245ce9ad11a30c9676c1e395534ecb503f1893bf0ec18d4cd8e46779ede5cbc8

    • SHA512

      1efaa1189ae8ea5ffe54c2a58d910e444096e0d371b60bd47bb045fd96de15894a2c16ff407c73917e585a38a1024cd15c2c050fa4f61421053abea4e1c7be06

    • SSDEEP

      3072:xAOmmA2jcc0lbxOGXJtXwygPQ6VCBxVCS:M+P

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks