General

  • Target

    document-1473590378.xls

  • Size

    331KB

  • Sample

    201126-2yysg6krta

  • MD5

    bb1bbf6b86eb3455f3f8ff428b8be07c

  • SHA1

    06f20b138a1c9ee9ed08a67c15dca167c2e4deea

  • SHA256

    8bd976c027bbc71ef08914ed9710202bb4ecd0394aff95b5312a936e029d3fb6

  • SHA512

    ac5d6a49617227005f65fc7eaf2265ff66940d672d872cba7f6e8d6f2aeba2eb9945ef0e2e482f34eabf0df63a21a02cc8a5e5d6bb822aba7d49cc3b560277b8

Score
10/10

Malware Config

Targets

    • Target

      document-1473590378.xls

    • Size

      331KB

    • MD5

      bb1bbf6b86eb3455f3f8ff428b8be07c

    • SHA1

      06f20b138a1c9ee9ed08a67c15dca167c2e4deea

    • SHA256

      8bd976c027bbc71ef08914ed9710202bb4ecd0394aff95b5312a936e029d3fb6

    • SHA512

      ac5d6a49617227005f65fc7eaf2265ff66940d672d872cba7f6e8d6f2aeba2eb9945ef0e2e482f34eabf0df63a21a02cc8a5e5d6bb822aba7d49cc3b560277b8

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks