General

  • Target

    document-1477025038.xls

  • Size

    331KB

  • Sample

    201126-l81g1b37nx

  • MD5

    a7bdfd25b83923dcff56c7ea7d9b3270

  • SHA1

    caf7b069f111957fc41775824c238e2149417f11

  • SHA256

    81f506985319e479025be2aab66b704929351fdaaed083d56d93cf5678d6a94a

  • SHA512

    078f39b4f12b18c99b8add15a80893ab339c34ad33384d7e728007ba035e94c061811433c5602d49ce1d960088b3492452d51abfe070b4f507163e1a9e637951

Score
10/10

Malware Config

Targets

    • Target

      document-1477025038.xls

    • Size

      331KB

    • MD5

      a7bdfd25b83923dcff56c7ea7d9b3270

    • SHA1

      caf7b069f111957fc41775824c238e2149417f11

    • SHA256

      81f506985319e479025be2aab66b704929351fdaaed083d56d93cf5678d6a94a

    • SHA512

      078f39b4f12b18c99b8add15a80893ab339c34ad33384d7e728007ba035e94c061811433c5602d49ce1d960088b3492452d51abfe070b4f507163e1a9e637951

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks