General

  • Target

    document-1510588220.xls

  • Size

    331KB

  • Sample

    201126-t8e167v3rs

  • MD5

    c7df73dd7808486ab41500049f73f89f

  • SHA1

    6e31d6f6233a148d14c200db4ccf8406cf8ed36f

  • SHA256

    890b8f6aca95f37e83ce18d769171a043ed8c24d783d358d6d6db464804243ff

  • SHA512

    eed1d0ba7c3a324abe5d728ca2f9a5eb84e672888e3afcf67bc0c36193170451101d343f688d6300e00686ad4235c5bcb419e5e46977236c58201d20ccfac08f

Score
10/10

Malware Config

Targets

    • Target

      document-1510588220.xls

    • Size

      331KB

    • MD5

      c7df73dd7808486ab41500049f73f89f

    • SHA1

      6e31d6f6233a148d14c200db4ccf8406cf8ed36f

    • SHA256

      890b8f6aca95f37e83ce18d769171a043ed8c24d783d358d6d6db464804243ff

    • SHA512

      eed1d0ba7c3a324abe5d728ca2f9a5eb84e672888e3afcf67bc0c36193170451101d343f688d6300e00686ad4235c5bcb419e5e46977236c58201d20ccfac08f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks