General

  • Target

    document-1529051733.xls

  • Size

    331KB

  • Sample

    201126-9n531gw3dj

  • MD5

    a6b8e5a418398ad63cc34dd0fbd839e8

  • SHA1

    6ae369b1c4b3ac0681c2dba324e3e7fed74f35e6

  • SHA256

    5a6cee8a4e9e5e2b7d2c8b8b9971a6c6ca432a9f4c3af4e657238e0553b131dd

  • SHA512

    3370941b0e9a07aa6df514d067cb7fb2db831bfbd82404639db66a2e3d645c15ec6c187aee5f6194a3416b1fb2515a5cd16790b915e1a4f890b498ea09614cdd

Score
10/10

Malware Config

Targets

    • Target

      document-1529051733.xls

    • Size

      331KB

    • MD5

      a6b8e5a418398ad63cc34dd0fbd839e8

    • SHA1

      6ae369b1c4b3ac0681c2dba324e3e7fed74f35e6

    • SHA256

      5a6cee8a4e9e5e2b7d2c8b8b9971a6c6ca432a9f4c3af4e657238e0553b131dd

    • SHA512

      3370941b0e9a07aa6df514d067cb7fb2db831bfbd82404639db66a2e3d645c15ec6c187aee5f6194a3416b1fb2515a5cd16790b915e1a4f890b498ea09614cdd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks