General

  • Target

    0113_35727287.doc

  • Size

    633KB

  • Sample

    210113-9dkme1y7qx

  • MD5

    e688ebdab6916fc89610c89ccb94ce16

  • SHA1

    a91447a728148e321fc576c6b55b3e9ba886bb8a

  • SHA256

    772c897ffdfb824b31d70ea360224714ab9bb83659bd431897cc74dd2defc2f3

  • SHA512

    7ec1f08fff2ae185421ddf6e1089349b1e9a0c0123c75d147b80c5ae0fc18938c2f781fc44d84e8abe0c4e251dbdfe3ea9499087345c39291fa96b9d18a39bf2

Score
10/10

Malware Config

Targets

    • Target

      0113_35727287.doc

    • Size

      633KB

    • MD5

      e688ebdab6916fc89610c89ccb94ce16

    • SHA1

      a91447a728148e321fc576c6b55b3e9ba886bb8a

    • SHA256

      772c897ffdfb824b31d70ea360224714ab9bb83659bd431897cc74dd2defc2f3

    • SHA512

      7ec1f08fff2ae185421ddf6e1089349b1e9a0c0123c75d147b80c5ae0fc18938c2f781fc44d84e8abe0c4e251dbdfe3ea9499087345c39291fa96b9d18a39bf2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks