General

  • Target

    0224_80188103030762.doc

  • Size

    342KB

  • Sample

    210224-fpf93eer3x

  • MD5

    7fc5aa5b2e8ce00bb672ad56a71651c0

  • SHA1

    2f51502b91b341cd7d0796d6abcc859658efbcfa

  • SHA256

    b82d2b0e5100db95cc6cfb9e88d42e4141bb7da4836d0ba7733b30e9bbc4e47d

  • SHA512

    233fe8fbcf2e3d88d353d0aa8a3387904b86f4e064d303aef11ca7b22a84cec308b8d27f8adc19580a080414e4148138495b3a32658ab9f0c106df41e2e68ea1

Malware Config

Targets

    • Target

      0224_80188103030762.doc

    • Size

      342KB

    • MD5

      7fc5aa5b2e8ce00bb672ad56a71651c0

    • SHA1

      2f51502b91b341cd7d0796d6abcc859658efbcfa

    • SHA256

      b82d2b0e5100db95cc6cfb9e88d42e4141bb7da4836d0ba7733b30e9bbc4e47d

    • SHA512

      233fe8fbcf2e3d88d353d0aa8a3387904b86f4e064d303aef11ca7b22a84cec308b8d27f8adc19580a080414e4148138495b3a32658ab9f0c106df41e2e68ea1

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks