General

  • Target

    Marzo.ppa

  • Size

    54KB

  • Sample

    230317-rrp6haaf5t

  • MD5

    a7b9fa984e5fc897da9871f5efea2aad

  • SHA1

    a1e4a02b1fb617ede5dba236642eedd7eb24df93

  • SHA256

    ca6cca63731e86074f4b715fd5ff280771c7478aa9e336267e8cc95cdf4905fe

  • SHA512

    10e1eaf4f11771e977ce7ffcaf2fb2a8bc8a260b47422561ffe782f71a6937def6c97dc949b58532513bba4e2cbf70685710eba34b442a002191f0c2dee8c5bd

  • SSDEEP

    384:XvA6kFP4VCa8KJKrhr09JrDucC9Q8UfTb:6FP4VCaJJMxIgcCVU

Score
10/10

Malware Config

Targets

    • Target

      Marzo.ppa

    • Size

      54KB

    • MD5

      a7b9fa984e5fc897da9871f5efea2aad

    • SHA1

      a1e4a02b1fb617ede5dba236642eedd7eb24df93

    • SHA256

      ca6cca63731e86074f4b715fd5ff280771c7478aa9e336267e8cc95cdf4905fe

    • SHA512

      10e1eaf4f11771e977ce7ffcaf2fb2a8bc8a260b47422561ffe782f71a6937def6c97dc949b58532513bba4e2cbf70685710eba34b442a002191f0c2dee8c5bd

    • SSDEEP

      384:XvA6kFP4VCa8KJKrhr09JrDucC9Q8UfTb:6FP4VCaJJMxIgcCVU

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Tasks