General

  • Target

    document-1459095245.xls

  • Size

    332KB

  • Sample

    201126-lrle1zljve

  • MD5

    ced4988c25a7bd84a43d41cf90c2351a

  • SHA1

    d5303805784e2bcd1f4f1bd4d9a74d5b4dd650c8

  • SHA256

    f22ecc2b3574f42340051664ee3512c69ca9741684aeb52cddd89a9bf02aa9a2

  • SHA512

    a5a1b2e403619b9bc8bc3aa6fa303e3b9df94157a7c9078657a8429e338e8e4214dde10060f3b08f29c2c4e1be9d5d058e6bdc4fef308ea1830450f588ca3d12

Score
10/10

Malware Config

Targets

    • Target

      document-1459095245.xls

    • Size

      332KB

    • MD5

      ced4988c25a7bd84a43d41cf90c2351a

    • SHA1

      d5303805784e2bcd1f4f1bd4d9a74d5b4dd650c8

    • SHA256

      f22ecc2b3574f42340051664ee3512c69ca9741684aeb52cddd89a9bf02aa9a2

    • SHA512

      a5a1b2e403619b9bc8bc3aa6fa303e3b9df94157a7c9078657a8429e338e8e4214dde10060f3b08f29c2c4e1be9d5d058e6bdc4fef308ea1830450f588ca3d12

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks