General

  • Target

    bid 06.09.2020.doc

  • Size

    117KB

  • Sample

    200609-j5p413zgw6

  • MD5

    604ffddf9b128893501e078cf20614b4

  • SHA1

    00ab48b309631ea1420542e84792619fef594b0f

  • SHA256

    ecd83bffe02f85d61cebfd27c78e305e427ff5ad30c3cf6c03db5b59a5dc7997

  • SHA512

    f5437529f735bbbbdc36891d49375eaaa2fe03b48b802dbc6826ede3e55ea337e7a61dc09249fb92c5da32717b58fc242ee80433bc473e8ddd49ad65c00512fb

Malware Config

Targets

    • Target

      bid 06.09.2020.doc

    • Size

      117KB

    • MD5

      604ffddf9b128893501e078cf20614b4

    • SHA1

      00ab48b309631ea1420542e84792619fef594b0f

    • SHA256

      ecd83bffe02f85d61cebfd27c78e305e427ff5ad30c3cf6c03db5b59a5dc7997

    • SHA512

      f5437529f735bbbbdc36891d49375eaaa2fe03b48b802dbc6826ede3e55ea337e7a61dc09249fb92c5da32717b58fc242ee80433bc473e8ddd49ad65c00512fb

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Valak

      Valak is a JavaScript loader, a link in a chain of distribution of other malware families.

    • Valak JavaScript Loader

    • Loads dropped DLL

    • Drops file in System32 directory

    • Modifies service

MITRE ATT&CK Enterprise v6

Tasks