General

  • Target

    document-1353428775.xls

  • Size

    331KB

  • Sample

    201126-l8xr8zmn3s

  • MD5

    c58d7807f54f9c3d775672dca757e2f0

  • SHA1

    c129d74d6db12730c6487c2d86a53de8e18dd75d

  • SHA256

    0d8e8f24cc591865231bfe849ac641eadee73a62e926312435f172e73a13bc8b

  • SHA512

    fd1308272aba24302c85c9b57e5e5e73c40be3dffb1c4fee69166f58f422a42ee4f2946178327ee652157ccf772b86c67280c8ea64a1f523e5cf7f571206401c

Score
10/10

Malware Config

Targets

    • Target

      document-1353428775.xls

    • Size

      331KB

    • MD5

      c58d7807f54f9c3d775672dca757e2f0

    • SHA1

      c129d74d6db12730c6487c2d86a53de8e18dd75d

    • SHA256

      0d8e8f24cc591865231bfe849ac641eadee73a62e926312435f172e73a13bc8b

    • SHA512

      fd1308272aba24302c85c9b57e5e5e73c40be3dffb1c4fee69166f58f422a42ee4f2946178327ee652157ccf772b86c67280c8ea64a1f523e5cf7f571206401c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks