General

  • Target

    321b5dbbc36ac4946955905f9dd4f44b15df30cbfd7d2be1d8b6171c1ee71b67_minebridge.doc

  • Size

    118KB

  • Sample

    210116-cfcgjpx9ve

  • MD5

    f95643710018c437754b8a11cc943348

  • SHA1

    f590e1b6a80cf3e8360388382eabb04b3e247b78

  • SHA256

    321b5dbbc36ac4946955905f9dd4f44b15df30cbfd7d2be1d8b6171c1ee71b67

  • SHA512

    f39abfd51e62f145376b5587cd515072e01740e10e967f401057c00403017c6754264bed08f8bef819829a80762ce572b40463b7854db33a961ff2e624509fba

Malware Config

Targets

    • Target

      321b5dbbc36ac4946955905f9dd4f44b15df30cbfd7d2be1d8b6171c1ee71b67_minebridge.doc

    • Size

      118KB

    • MD5

      f95643710018c437754b8a11cc943348

    • SHA1

      f590e1b6a80cf3e8360388382eabb04b3e247b78

    • SHA256

      321b5dbbc36ac4946955905f9dd4f44b15df30cbfd7d2be1d8b6171c1ee71b67

    • SHA512

      f39abfd51e62f145376b5587cd515072e01740e10e967f401057c00403017c6754264bed08f8bef819829a80762ce572b40463b7854db33a961ff2e624509fba

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks