Resubmissions

15-03-2023 22:24

230315-2bkk7ahh2v 10

15-03-2023 22:11

230315-139tqafe65 10

15-03-2023 22:08

230315-12bwashg4t 4

General

  • Target

    1603.one

  • Size

    130KB

  • Sample

    230315-2bkk7ahh2v

  • MD5

    3267ae8154776913b0032a6806fdb9c3

  • SHA1

    9bcc9835656c3e7ab5a08476e604cfea8ee1b6b1

  • SHA256

    fe983efbd9760c4875fd711062dd94d91c9e31c1a5fc47d288ef72ba6c913266

  • SHA512

    2d1904620234b26a0dd85e78c6643f6e15d89d4b5b3a33db926b7485873ba89e20008fa6ddadb8e85f693c4bfcb6b82d75acbecdbf0b9654800643d8ce405606

  • SSDEEP

    3072:PrfWMINYf3K19kzCnEEQvSMVnte8ZP1Y6J0cTgGQ:d6nInM8TXJ5Q

Score
10/10

Malware Config

Targets

    • Target

      1603.one

    • Size

      130KB

    • MD5

      3267ae8154776913b0032a6806fdb9c3

    • SHA1

      9bcc9835656c3e7ab5a08476e604cfea8ee1b6b1

    • SHA256

      fe983efbd9760c4875fd711062dd94d91c9e31c1a5fc47d288ef72ba6c913266

    • SHA512

      2d1904620234b26a0dd85e78c6643f6e15d89d4b5b3a33db926b7485873ba89e20008fa6ddadb8e85f693c4bfcb6b82d75acbecdbf0b9654800643d8ce405606

    • SSDEEP

      3072:PrfWMINYf3K19kzCnEEQvSMVnte8ZP1Y6J0cTgGQ:d6nInM8TXJ5Q

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks