General

  • Target

    file 07.08.2020.doc

  • Size

    147KB

  • Sample

    200711-kryaztr8ta

  • MD5

    f87de9e54541c53de616b230852e0d28

  • SHA1

    9cf0153c3a04a30c138ab649b8a8cb1286c8fd8a

  • SHA256

    f9b682245ad0fe442e1bbe331f67b8c6a6241aac9fb2aa727b020a4f0a897ce2

  • SHA512

    5652193e9c969fb3150a8e8c2291f8b964f83ef1e3868df579666273b3abb7f56264993ee259a59e866d38f663f158dc9bd1fc046b377abf8bd8b5fe098e99b5

Score
10/10

Malware Config

Targets

    • Target

      file 07.08.2020.doc

    • Size

      147KB

    • MD5

      f87de9e54541c53de616b230852e0d28

    • SHA1

      9cf0153c3a04a30c138ab649b8a8cb1286c8fd8a

    • SHA256

      f9b682245ad0fe442e1bbe331f67b8c6a6241aac9fb2aa727b020a4f0a897ce2

    • SHA512

      5652193e9c969fb3150a8e8c2291f8b964f83ef1e3868df579666273b3abb7f56264993ee259a59e866d38f663f158dc9bd1fc046b377abf8bd8b5fe098e99b5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks