General

  • Target

    nix4e_com_ursnif.doc

  • Size

    132KB

  • Sample

    200709-wc52y3t2pj

  • MD5

    80cfa4babf4a24cdd752ea920b409adc

  • SHA1

    90669c6e3c86881facbb3ad6d44d7509b08116fb

  • SHA256

    fed5b5e20c6b7704573865320c3ba2d3e41844747ec4cf21cece347997b7a10e

  • SHA512

    2fbb2068519cf5425013ecb21e0c0741b195f8159ac97aa960835f1b9ebe78b3b9970322c33424e701ed4d5516eb345a2b868d20531f58a27ce484d99e0973c1

Score
10/10

Malware Config

Targets

    • Target

      nix4e_com_ursnif.doc

    • Size

      132KB

    • MD5

      80cfa4babf4a24cdd752ea920b409adc

    • SHA1

      90669c6e3c86881facbb3ad6d44d7509b08116fb

    • SHA256

      fed5b5e20c6b7704573865320c3ba2d3e41844747ec4cf21cece347997b7a10e

    • SHA512

      2fbb2068519cf5425013ecb21e0c0741b195f8159ac97aa960835f1b9ebe78b3b9970322c33424e701ed4d5516eb345a2b868d20531f58a27ce484d99e0973c1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks