General

  • Target

    dettare,07.08.2020.doc

  • Size

    147KB

  • Sample

    200711-51hzks5cnx

  • MD5

    061512f14b859a08f47b81307ffc19c6

  • SHA1

    a55ce3446a75350bb2fa06816b2b39d490c6d088

  • SHA256

    7322c0954a7addf1f90f728e52464bacec8c6bf4ff810fce58de58c20bfdf5af

  • SHA512

    6ad9d50aec3833f4137025a6e85359c467ffa574c5181926ddd10385b68913dae695dc6758a207dd5bb89471709d3a9597658f3191d0bd64f09621c722e738c5

Score
10/10

Malware Config

Targets

    • Target

      dettare,07.08.2020.doc

    • Size

      147KB

    • MD5

      061512f14b859a08f47b81307ffc19c6

    • SHA1

      a55ce3446a75350bb2fa06816b2b39d490c6d088

    • SHA256

      7322c0954a7addf1f90f728e52464bacec8c6bf4ff810fce58de58c20bfdf5af

    • SHA512

      6ad9d50aec3833f4137025a6e85359c467ffa574c5181926ddd10385b68913dae695dc6758a207dd5bb89471709d3a9597658f3191d0bd64f09621c722e738c5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks