General

  • Target

    INV-1581.doc

  • Size

    149KB

  • Sample

    210306-pygqllkph2

  • MD5

    470b5f77bd00e2002939833ab72ad47a

  • SHA1

    540fb80aae64faccbb47ced4d4ec57448ca4297e

  • SHA256

    7df11aa42a30d550a3fba77ed9fc353108f4cac53a2dac6f29a6534dd0ecbd06

  • SHA512

    69a569c079bf78693d751d3834f94888de5f3276b69d9eb63c09bec678335dbb0740337d87646ea26325851d2e4754c881d7c7512520d5831468bc07a84f6b55

Malware Config

Targets

    • Target

      INV-1581.doc

    • Size

      149KB

    • MD5

      470b5f77bd00e2002939833ab72ad47a

    • SHA1

      540fb80aae64faccbb47ced4d4ec57448ca4297e

    • SHA256

      7df11aa42a30d550a3fba77ed9fc353108f4cac53a2dac6f29a6534dd0ecbd06

    • SHA512

      69a569c079bf78693d751d3834f94888de5f3276b69d9eb63c09bec678335dbb0740337d87646ea26325851d2e4754c881d7c7512520d5831468bc07a84f6b55

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks