General

  • Target

    raccontare_07.08.2020.doc

  • Size

    147KB

  • Sample

    200711-bkmrzk54v2

  • MD5

    e6e2e58b5fe7abb80691e1bd6ecace38

  • SHA1

    37b2d8231c3d90505115f8099a703823635907ce

  • SHA256

    a87a4a43ea99fea877e46a92cf90434b15667e7ef463da04640af1bb5116c7ca

  • SHA512

    c446c381badf8ba18d96844564cdf31a2ead8c3d37f81f943f2a68a152eb87b2004101cd12fad5f48188351c351e24b61a4e6412c753d6a6560aa886054353cc

Score
10/10

Malware Config

Targets

    • Target

      raccontare_07.08.2020.doc

    • Size

      147KB

    • MD5

      e6e2e58b5fe7abb80691e1bd6ecace38

    • SHA1

      37b2d8231c3d90505115f8099a703823635907ce

    • SHA256

      a87a4a43ea99fea877e46a92cf90434b15667e7ef463da04640af1bb5116c7ca

    • SHA512

      c446c381badf8ba18d96844564cdf31a2ead8c3d37f81f943f2a68a152eb87b2004101cd12fad5f48188351c351e24b61a4e6412c753d6a6560aa886054353cc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks