General

  • Target

    587faadcbc9befc18e0a30e113cfa7c8.doc

  • Size

    323KB

  • Sample

    210308-dkpkheexvx

  • MD5

    587faadcbc9befc18e0a30e113cfa7c8

  • SHA1

    5b98b9e81a551f59a93b135e1920fd7c8a348829

  • SHA256

    b5d33f100cfaf6088a506807168093ece7872d028b05bd706158cbb1171a50a0

  • SHA512

    82c7f911ab1016ecea045d6692fb06cd61eb9d1f3b2743d40b877422cf4b9e22513a4034e2a6ed26cfde466ad24d5497d8098ab9971da73645169ae618805b9f

Score
10/10

Malware Config

Targets

    • Target

      587faadcbc9befc18e0a30e113cfa7c8.doc

    • Size

      323KB

    • MD5

      587faadcbc9befc18e0a30e113cfa7c8

    • SHA1

      5b98b9e81a551f59a93b135e1920fd7c8a348829

    • SHA256

      b5d33f100cfaf6088a506807168093ece7872d028b05bd706158cbb1171a50a0

    • SHA512

      82c7f911ab1016ecea045d6692fb06cd61eb9d1f3b2743d40b877422cf4b9e22513a4034e2a6ed26cfde466ad24d5497d8098ab9971da73645169ae618805b9f

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks