General

  • Target

    Debt-Details-1388003497-03052021.xls

  • Size

    78KB

  • Sample

    210306-ppwldk9e32

  • MD5

    12a5851cea8f81ec1b5deebc5ccfc6c2

  • SHA1

    148282ad98eb4aae63030f7b85581ed8d9cdf99e

  • SHA256

    2dba3900155f3c89031fbce6b06fd8bf85f066a3e12b8f4a0b6142f5150befa4

  • SHA512

    60d2f8867669919aa68195e2c3d36ffa1ae06c3435ebd50059f64757ab1544b4a8fb356ff66bd7fd13fa5bc70bce02d675307a3ca319bcd7661fb3763f171e77

Score
10/10

Malware Config

Targets

    • Target

      Debt-Details-1388003497-03052021.xls

    • Size

      78KB

    • MD5

      12a5851cea8f81ec1b5deebc5ccfc6c2

    • SHA1

      148282ad98eb4aae63030f7b85581ed8d9cdf99e

    • SHA256

      2dba3900155f3c89031fbce6b06fd8bf85f066a3e12b8f4a0b6142f5150befa4

    • SHA512

      60d2f8867669919aa68195e2c3d36ffa1ae06c3435ebd50059f64757ab1544b4a8fb356ff66bd7fd13fa5bc70bce02d675307a3ca319bcd7661fb3763f171e77

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks