General

  • Target

    0112_1005636132.doc

  • Size

    735KB

  • Sample

    210112-paa29vsfhs

  • MD5

    5773e90313ac82d4a3a2174260e486da

  • SHA1

    4e40fbd0b04aee9b1c0f0daeb61e3f3879870cd5

  • SHA256

    8bcf45c2de07f322b8efb959e3cef38fb9983fdb8b932c527321fd3db5e444c8

  • SHA512

    b34dc85f0b44753e0291e429ef0d5ca5ab92f291fd3d49b8dca82053b56898e56d1be8bb9375436ffeb32a8298ff8de2d25d86fbab01a7e09c2dddea34acdf4a

Score
10/10

Malware Config

Targets

    • Target

      0112_1005636132.doc

    • Size

      735KB

    • MD5

      5773e90313ac82d4a3a2174260e486da

    • SHA1

      4e40fbd0b04aee9b1c0f0daeb61e3f3879870cd5

    • SHA256

      8bcf45c2de07f322b8efb959e3cef38fb9983fdb8b932c527321fd3db5e444c8

    • SHA512

      b34dc85f0b44753e0291e429ef0d5ca5ab92f291fd3d49b8dca82053b56898e56d1be8bb9375436ffeb32a8298ff8de2d25d86fbab01a7e09c2dddea34acdf4a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks