General

  • Target

    0112_91448090.doc

  • Size

    735KB

  • Sample

    210112-s5774lc9gj

  • MD5

    6a86a3f2527f8b42089108b78763e3ea

  • SHA1

    18d2deff4bd27da46897ea93dace03e7dca71084

  • SHA256

    6cd76e8f33a945b51d20b909495bbc613f78151dbea6c3a7a3a235bfd2167cdf

  • SHA512

    ba4a3c88140b4f475300a75dc3e15f74a245ad2cfe0285b3ea515bde7ca6d8f87e4d8e6bce8d5ed095cd4660b08bc960fc34e743cb6b4d6f38c744e269168f1e

Score
10/10

Malware Config

Targets

    • Target

      0112_91448090.doc

    • Size

      735KB

    • MD5

      6a86a3f2527f8b42089108b78763e3ea

    • SHA1

      18d2deff4bd27da46897ea93dace03e7dca71084

    • SHA256

      6cd76e8f33a945b51d20b909495bbc613f78151dbea6c3a7a3a235bfd2167cdf

    • SHA512

      ba4a3c88140b4f475300a75dc3e15f74a245ad2cfe0285b3ea515bde7ca6d8f87e4d8e6bce8d5ed095cd4660b08bc960fc34e743cb6b4d6f38c744e269168f1e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks