General

  • Target

    legiferare 07.20.doc

  • Size

    134KB

  • Sample

    200711-53qll69cqn

  • MD5

    4546be948c84aa4731d78af17b9c9d70

  • SHA1

    3dec189d0cfdf3646156438bb18fb59f78c974c0

  • SHA256

    06ba12dd9057e92557adafaaf4a2c77e0553483e4074b5d723669f07921e0ae6

  • SHA512

    2d478066f021420fed6e4147f2a86c8eee1238cabc30b3688cef7d59892fd90c114bd4141c2860beeb70ce4138fc2339166782cb23c7b28a27546d90cfe0d7e9

Score
10/10

Malware Config

Targets

    • Target

      legiferare 07.20.doc

    • Size

      134KB

    • MD5

      4546be948c84aa4731d78af17b9c9d70

    • SHA1

      3dec189d0cfdf3646156438bb18fb59f78c974c0

    • SHA256

      06ba12dd9057e92557adafaaf4a2c77e0553483e4074b5d723669f07921e0ae6

    • SHA512

      2d478066f021420fed6e4147f2a86c8eee1238cabc30b3688cef7d59892fd90c114bd4141c2860beeb70ce4138fc2339166782cb23c7b28a27546d90cfe0d7e9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks