General

  • Target

    malware.doc

  • Size

    706KB

  • Sample

    200214-kel2belltx

  • MD5

    7ec6040afdd48b8f2052f24d3491584b

  • SHA1

    1d25b4a1019f6e703c56c25bbf363919b8a6c726

  • SHA256

    b90ffcd18fdb57ffe491638935458108ea0729ae9d8c09e08249e64078a85d62

  • SHA512

    22cb667d23f7d1714b2979525dfa463bd5b812b03543e3ab6e2274f0c87d8fae71349c87c2f1b9d6d6b00f19695e4bab855aae5c3a1be6c2838da6990ecd5180

Score
10/10

Malware Config

Targets

    • Target

      malware.doc

    • Size

      706KB

    • MD5

      7ec6040afdd48b8f2052f24d3491584b

    • SHA1

      1d25b4a1019f6e703c56c25bbf363919b8a6c726

    • SHA256

      b90ffcd18fdb57ffe491638935458108ea0729ae9d8c09e08249e64078a85d62

    • SHA512

      22cb667d23f7d1714b2979525dfa463bd5b812b03543e3ab6e2274f0c87d8fae71349c87c2f1b9d6d6b00f19695e4bab855aae5c3a1be6c2838da6990ecd5180

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks