General

  • Target

    69609a4f5c21218b7b53376aa4c9ff33d23f9a078cc728ce291402cc91e60292

  • Size

    12KB

  • Sample

    240522-2njjnabg6z

  • MD5

    4ee91d6d1bf14e64918c05d3ceaafaf2

  • SHA1

    4a8072f77f28d684fb3ebe49b4be8c8fba6ae713

  • SHA256

    69609a4f5c21218b7b53376aa4c9ff33d23f9a078cc728ce291402cc91e60292

  • SHA512

    bd080d7844b5760f022d347206f5974280f720150a92436bf5afcd082cf346902c8076e86e76ece7da309c6b8896d4f83033dc2781ae2fe7f5979eb091139143

  • SSDEEP

    192:KL29RBzDzeobchBj8JONBrON6m6+oruCrEPEjr7Ahy:029jnbcvYJO2nbwuCvr7Cy

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      69609a4f5c21218b7b53376aa4c9ff33d23f9a078cc728ce291402cc91e60292

    • Size

      12KB

    • MD5

      4ee91d6d1bf14e64918c05d3ceaafaf2

    • SHA1

      4a8072f77f28d684fb3ebe49b4be8c8fba6ae713

    • SHA256

      69609a4f5c21218b7b53376aa4c9ff33d23f9a078cc728ce291402cc91e60292

    • SHA512

      bd080d7844b5760f022d347206f5974280f720150a92436bf5afcd082cf346902c8076e86e76ece7da309c6b8896d4f83033dc2781ae2fe7f5979eb091139143

    • SSDEEP

      192:KL29RBzDzeobchBj8JONBrON6m6+oruCrEPEjr7Ahy:029jnbcvYJO2nbwuCvr7Cy

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks