General

  • Target

    file.07.08.2020.doc

  • Size

    147KB

  • Sample

    200711-xdabaaxyb6

  • MD5

    2b80ba856cc8ef3cb3cf5b79c8fea75b

  • SHA1

    7b3e87693a6c795806f94304852691f81a995623

  • SHA256

    aab2c9e64ba3bc97562152cd9fce47d31093b6ae38b6ca0cffc35510a53b57e6

  • SHA512

    b68251e3168c5c2217d01c582a999efeffb2e8882c59b5b398f4cd706ea328483729a928ffc4d5d305bf285d90dacc637aaad14f90a4b21fcf00e40d4a34aa2a

Score
10/10

Malware Config

Targets

    • Target

      file.07.08.2020.doc

    • Size

      147KB

    • MD5

      2b80ba856cc8ef3cb3cf5b79c8fea75b

    • SHA1

      7b3e87693a6c795806f94304852691f81a995623

    • SHA256

      aab2c9e64ba3bc97562152cd9fce47d31093b6ae38b6ca0cffc35510a53b57e6

    • SHA512

      b68251e3168c5c2217d01c582a999efeffb2e8882c59b5b398f4cd706ea328483729a928ffc4d5d305bf285d90dacc637aaad14f90a4b21fcf00e40d4a34aa2a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks