General

  • Target

    adjure_06.26.2020.doc

  • Size

    117KB

  • Sample

    200628-ap6kppw41j

  • MD5

    7ecef428b39c93f449292c1344c2d26f

  • SHA1

    32170dadf5481cdf794bb13e8c794df277c1f828

  • SHA256

    c2222ea9ba5e0bceba9721084fb70b803f6a4cbf962e98b9a8ea3125f76a685f

  • SHA512

    86bcadffcb89775307ba4f401f97dbec89e2eebc6f66b08b1b8cf9caa722951c7623a5007658c9bc08861a7191808ce649826111b9575d8c610240111c556967

Score
10/10

Malware Config

Targets

    • Target

      adjure_06.26.2020.doc

    • Size

      117KB

    • MD5

      7ecef428b39c93f449292c1344c2d26f

    • SHA1

      32170dadf5481cdf794bb13e8c794df277c1f828

    • SHA256

      c2222ea9ba5e0bceba9721084fb70b803f6a4cbf962e98b9a8ea3125f76a685f

    • SHA512

      86bcadffcb89775307ba4f401f97dbec89e2eebc6f66b08b1b8cf9caa722951c7623a5007658c9bc08861a7191808ce649826111b9575d8c610240111c556967

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Valak

      Valak is a JavaScript loader, a link in a chain of distribution of other malware families.

    • Valak JavaScript Loader

    • Loads dropped DLL

    • JavaScript code in executable

MITRE ATT&CK Enterprise v6

Tasks