General

  • Target

    b0f09f5816add23c678b2aa0a8d17b50

  • Size

    104KB

  • Sample

    230314-ksp4kage6x

  • MD5

    b0f09f5816add23c678b2aa0a8d17b50

  • SHA1

    165a2af2672106c151e4b9d8384122d98dad8f95

  • SHA256

    80a486187ccdb41674fbdcff3cd29ba939fa7ecb802fc7d64a44b9303089cbfe

  • SHA512

    401fbf423a84987d1965dd1ce7d904952da7b62f0ab660e4b76eedbadf5ee30e8085250036398a92203de0d609c51c17349108508d5d22864f483451b8c18518

  • SSDEEP

    1536:XDDDq39i5jhu2LvS+umcieOFqob+yAd9b2jcc0lbxOrqol3cJtXwDNjvRHzKXKaz:WyS2jcc0lbxOGBJtXwhjdKXKxyT

Score
10/10

Malware Config

Targets

    • Target

      b0f09f5816add23c678b2aa0a8d17b50

    • Size

      104KB

    • MD5

      b0f09f5816add23c678b2aa0a8d17b50

    • SHA1

      165a2af2672106c151e4b9d8384122d98dad8f95

    • SHA256

      80a486187ccdb41674fbdcff3cd29ba939fa7ecb802fc7d64a44b9303089cbfe

    • SHA512

      401fbf423a84987d1965dd1ce7d904952da7b62f0ab660e4b76eedbadf5ee30e8085250036398a92203de0d609c51c17349108508d5d22864f483451b8c18518

    • SSDEEP

      1536:XDDDq39i5jhu2LvS+umcieOFqob+yAd9b2jcc0lbxOrqol3cJtXwDNjvRHzKXKaz:WyS2jcc0lbxOGBJtXwhjdKXKxyT

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks