General

  • Target

    document-1482091668.xls

  • Size

    331KB

  • Sample

    201126-2mpr8s64fx

  • MD5

    4b3852be4bfc9560dd5a33357247fb99

  • SHA1

    d516f9ce50ebd85cf95fa51928844c404cc39379

  • SHA256

    8023a8552f2abd3ce40196dcb4cb83c6fe859e843d12db5756dbdc92390c906b

  • SHA512

    528f88a4840dd25105df97936acec8a4b4b69c63d2b7b62fae330c0a7506b27d41ff72c8b46860b2ffa9703ebc14946ed177191cfdd28f9c1ca8a5eaf1f9a58c

Score
10/10

Malware Config

Targets

    • Target

      document-1482091668.xls

    • Size

      331KB

    • MD5

      4b3852be4bfc9560dd5a33357247fb99

    • SHA1

      d516f9ce50ebd85cf95fa51928844c404cc39379

    • SHA256

      8023a8552f2abd3ce40196dcb4cb83c6fe859e843d12db5756dbdc92390c906b

    • SHA512

      528f88a4840dd25105df97936acec8a4b4b69c63d2b7b62fae330c0a7506b27d41ff72c8b46860b2ffa9703ebc14946ed177191cfdd28f9c1ca8a5eaf1f9a58c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks