General

  • Target

    certificato_07.08.2020.doc

  • Size

    134KB

  • Sample

    200711-hv2rzdcr32

  • MD5

    212e1d537b4335f22f19efd8255f0e45

  • SHA1

    a399e390cc926727ee79eff1893ca317ca379cbd

  • SHA256

    dcfb8f77847d724370d6688b004e2dc005ca02fc1c9f5665896d43f546174620

  • SHA512

    7824d67e4c09cff9157db5eeaa8309da3c38941fac5e191d4f27ce618bf4280929576251ee46617c3966e7875cc1ff13366f18198e34a787cb02a172f8b4945d

Score
10/10

Malware Config

Targets

    • Target

      certificato_07.08.2020.doc

    • Size

      134KB

    • MD5

      212e1d537b4335f22f19efd8255f0e45

    • SHA1

      a399e390cc926727ee79eff1893ca317ca379cbd

    • SHA256

      dcfb8f77847d724370d6688b004e2dc005ca02fc1c9f5665896d43f546174620

    • SHA512

      7824d67e4c09cff9157db5eeaa8309da3c38941fac5e191d4f27ce618bf4280929576251ee46617c3966e7875cc1ff13366f18198e34a787cb02a172f8b4945d

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks