General

  • Target

    deed contract_11.19.2020.doc

  • Size

    104KB

  • Sample

    201120-b34l3yaete

  • MD5

    ab684a20573095e717d981ecf1aa3628

  • SHA1

    03e64be4b32f995c92d9a520e577af69ee74ac73

  • SHA256

    256fb74261454862a7d60629f94cfd17111a2e94d25abd68046be2b4ed4d9b87

  • SHA512

    b2aa52ad891f18ff76ddb3ba89518a1f599003d044b3e2e3525a605e467b81840286cef764c3caae128f44bfe14e2f28520d303a302076dc77b02cb147a89549

Score
8/10

Malware Config

Targets

    • Target

      deed contract_11.19.2020.doc

    • Size

      104KB

    • MD5

      ab684a20573095e717d981ecf1aa3628

    • SHA1

      03e64be4b32f995c92d9a520e577af69ee74ac73

    • SHA256

      256fb74261454862a7d60629f94cfd17111a2e94d25abd68046be2b4ed4d9b87

    • SHA512

      b2aa52ad891f18ff76ddb3ba89518a1f599003d044b3e2e3525a605e467b81840286cef764c3caae128f44bfe14e2f28520d303a302076dc77b02cb147a89549

    Score
    8/10
    • Blacklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Tasks