General

  • Target

    ACH Remittance Details.xls

  • Size

    35KB

  • Sample

    210118-ct5ld1m846

  • MD5

    b3931a02644f28eaee7711d36333eece

  • SHA1

    72e0ab0c9b992f94db5ae45022df57f1522b9895

  • SHA256

    d36d950e9c94564bcb37f058d4ba3636281a273fd59d7eac0f3dc8fa215b5590

  • SHA512

    5202adec9629fc94eaa70d2e6d62212a9ebde57e9d7e89709f33efd4fd54ab8f44c699fb9c4553b8b640273305ce73a0aece8a4935fef9c67c0d4c60ffd4da63

Malware Config

Targets

    • Target

      ACH Remittance Details.xls

    • Size

      35KB

    • MD5

      b3931a02644f28eaee7711d36333eece

    • SHA1

      72e0ab0c9b992f94db5ae45022df57f1522b9895

    • SHA256

      d36d950e9c94564bcb37f058d4ba3636281a273fd59d7eac0f3dc8fa215b5590

    • SHA512

      5202adec9629fc94eaa70d2e6d62212a9ebde57e9d7e89709f33efd4fd54ab8f44c699fb9c4553b8b640273305ce73a0aece8a4935fef9c67c0d4c60ffd4da63

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks