General

  • Target

    document-1474276477.xls

  • Size

    331KB

  • Sample

    201126-zl6ce1mnda

  • MD5

    4e2fdd2ad6ea93c4f0c4e8ebad7c384c

  • SHA1

    110fbc21311390df65f15f1daecf026eb9ba7084

  • SHA256

    fc6ab80fbc053cf7f436c12c50ea7689fe7d7a777bb1c7b5a6a95a6d69aeebad

  • SHA512

    5aa82c59728fe51fb7eb7257cead644911dbc66b14f9df2fccd711fa93d17b56105b92d225e690744d01bb6986d161aa4faf056070cf2fc889a9afa68ac5055c

Score
10/10

Malware Config

Targets

    • Target

      document-1474276477.xls

    • Size

      331KB

    • MD5

      4e2fdd2ad6ea93c4f0c4e8ebad7c384c

    • SHA1

      110fbc21311390df65f15f1daecf026eb9ba7084

    • SHA256

      fc6ab80fbc053cf7f436c12c50ea7689fe7d7a777bb1c7b5a6a95a6d69aeebad

    • SHA512

      5aa82c59728fe51fb7eb7257cead644911dbc66b14f9df2fccd711fa93d17b56105b92d225e690744d01bb6986d161aa4faf056070cf2fc889a9afa68ac5055c

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks