General

  • Target

    pay_229.xls

  • Size

    152KB

  • Sample

    200709-leqr2z7r3j

  • MD5

    bf51c240a19ef4c70131ec91208e1efe

  • SHA1

    1a6ff68d5b8c9af2f68723046723087f060bafa2

  • SHA256

    e7529044d473f6b84e93c1840732c593385b0375552263945dca0e234ecd3803

  • SHA512

    1eb37aab912ebcc2f9e80cbd98c94a1de718f74f9bb7e72e86da7e5b4429ade532e877ef7f52ec0307049455b0b58c6bd1b34cb760c480c01ce2a17518c9b341

Score
10/10

Malware Config

Targets

    • Target

      pay_229.xls

    • Size

      152KB

    • MD5

      bf51c240a19ef4c70131ec91208e1efe

    • SHA1

      1a6ff68d5b8c9af2f68723046723087f060bafa2

    • SHA256

      e7529044d473f6b84e93c1840732c593385b0375552263945dca0e234ecd3803

    • SHA512

      1eb37aab912ebcc2f9e80cbd98c94a1de718f74f9bb7e72e86da7e5b4429ade532e877ef7f52ec0307049455b0b58c6bd1b34cb760c480c01ce2a17518c9b341

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks