General

  • Target

    tell_05.27.2020.doc

  • Size

    73KB

  • Sample

    200529-w91r3jxd4x

  • MD5

    5144d81649f2d8fffbe01a0e59504714

  • SHA1

    5c06328d3d81f48ea3786ae863abf3d9b2b99de1

  • SHA256

    b787ee7e274f352c5981eaa77aa60a305220e3a831442c46f154ac7299321beb

  • SHA512

    6e0a9a01417e8fa7c8a707252ce2e75300a7d05d558f508a2594c7c217ab52bf730b432eda1f29232d42c527a8df6bab240f0901b175b2e5c6c4718712dd50c4

Score
10/10

Malware Config

Targets

    • Target

      tell_05.27.2020.doc

    • Size

      73KB

    • MD5

      5144d81649f2d8fffbe01a0e59504714

    • SHA1

      5c06328d3d81f48ea3786ae863abf3d9b2b99de1

    • SHA256

      b787ee7e274f352c5981eaa77aa60a305220e3a831442c46f154ac7299321beb

    • SHA512

      6e0a9a01417e8fa7c8a707252ce2e75300a7d05d558f508a2594c7c217ab52bf730b432eda1f29232d42c527a8df6bab240f0901b175b2e5c6c4718712dd50c4

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks