General

  • Target

    document-1555793858.xls

  • Size

    331KB

  • Sample

    201126-vr3zvvfsla

  • MD5

    e56ef6b8c8a0c46cea2c89bded7ebd25

  • SHA1

    1eabbbeb43e6401198f043833d729a611a06da66

  • SHA256

    6d58dd6505f695574c92ca0f16be887e1a20bf231f12a668c2f494879ad47a53

  • SHA512

    3f35d46ba1b571e91dc7af1feedbbb54f958fa0c09a0b345f35d7a50904a9e62a172b915165d292719631d28269eef606aae04db80341fa034442a958504ed2c

Score
10/10

Malware Config

Targets

    • Target

      document-1555793858.xls

    • Size

      331KB

    • MD5

      e56ef6b8c8a0c46cea2c89bded7ebd25

    • SHA1

      1eabbbeb43e6401198f043833d729a611a06da66

    • SHA256

      6d58dd6505f695574c92ca0f16be887e1a20bf231f12a668c2f494879ad47a53

    • SHA512

      3f35d46ba1b571e91dc7af1feedbbb54f958fa0c09a0b345f35d7a50904a9e62a172b915165d292719631d28269eef606aae04db80341fa034442a958504ed2c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks